Videos

Published on May 5th, 2019 📆 | 2022 Views ⚑

0

Where to begin when assessing hacker threats to our apps?


iSpeech.org


7CTOs hosted an AMA with executive partner at Independent Security Evaluators, Ted Harrington. It was a lively discussion where Ted guided a group of CTOs on how to think like a hacker when assessing security threats to our systems.

During this conversation we touched on the following questions. Click on the links to jump to the time code in the video:

What are common misconceptions CTOs have about securing their systems?
As a CTO, how do I educate my C-Suite and my engineering teams on security concerns?
When is a good time to consider security implications for my app?
Business requirements vs. Security requirements?
How your “attack surface” increases when your company acquires another
How to build the threat model targeting your apps
What are the characteristics of a CTO who does well to protect their apps
The ratio of automated attacks and social engineering attacks and the trend
What is a good cadence for security assessments

We also had a great conversation about penetration testing towards the end.





About Ted Harrington:

Ted Harrington is Executive Partner at Independent Security Evaluators, the elite organization of security researchers and consultants widely known for being the first company to hack the iPhone. Harrington has been named both Executive of the Year and 40 Under 40, and he is one of the organizers of popular hacking concept IoT Village. Harrington is a Boston Marathon finisher and holds a bachelor’s degree from Georgetown University.

Website https://www.linkedin.com/in/harringtonted/detail/recent-activity/posts/
Follow Ted on Twitter http://twitter.com/SecurityTed


2019-05-05 02:35:33

source

Tagged with:



Comments are closed.