About
Hi, I'm Ted.
I've dedicated my career to ethical hacking, on a mission to help…
Articles by Ted
Activity
-
It's that time to shout out our July work anniversaries! Congrats to Ali Esparza, Carl Xiong, Ben Schmerler, and Jolene Sundstrom. Here are their…
It's that time to shout out our July work anniversaries! Congrats to Ali Esparza, Carl Xiong, Ben Schmerler, and Jolene Sundstrom. Here are their…
Liked by Ted Harrington
-
Writing a book is HARD. It only takes a several weeks to write the first draft, but it takes MONTHS to edit it, and even then it still needs many…
Writing a book is HARD. It only takes a several weeks to write the first draft, but it takes MONTHS to edit it, and even then it still needs many…
Shared by Ted Harrington
-
“Channel3 Now, a website that masquerades as a legitimate American news outlet but acts as an “aggregator” for real news stories as well as fake…
“Channel3 Now, a website that masquerades as a legitimate American news outlet but acts as an “aggregator” for real news stories as well as fake…
Liked by Ted Harrington
Experience
Education
Courses
-
Abnormal Psychology
PSYC-151
-
Cross-Cultural Communication
LING-333
-
Ethics
PHIL-050
-
European & Global Politics
GOVT-329
-
Madness, Genius & Creativity
PSCY-352
-
Modern Psychology
PSYC-110
-
Motivation
PSYC-131
-
Philosophy of Law
PHIL-156
-
Psychology of Science
PSYC-365
-
Psychopathology
PSYC-353
-
Research Methods & Statistics
PSCY-002
-
US, Middle East & Politics of War
INAF-243
Projects
-
IoT Village
Organized by security consulting and research firm Independent Security Evaluators (ISE), the ISE IoT Village will deliver thought leadership advocating for security advancements in Internet of Things devices. The village will consist of workshops on hacking numerous off-the-shelf devices including medical devices, home appliances, routers, and storage devices; live educational talks; and a variety of contests.
Other creatorsSee project -
Connected Locking Systems: A Comparative Analysis of Mechanical vs. Electronic Access Control
-
Electronic locking mechanisms introduce new attack vectors as compared to mechanical locks, but if properly designed, there are no inherent flaws with systems that have such attack surfaces. Furthermore, hardened electronic locking systems introduce significant security upgrades over more traditionally deployed mechanical locks. However, the entire premise of security advantages in electronic locks is based on the condition that such a system has had security properly built in, as validated by…
Electronic locking mechanisms introduce new attack vectors as compared to mechanical locks, but if properly designed, there are no inherent flaws with systems that have such attack surfaces. Furthermore, hardened electronic locking systems introduce significant security upgrades over more traditionally deployed mechanical locks. However, the entire premise of security advantages in electronic locks is based on the condition that such a system has had security properly built in, as validated by design assessment, implementation assessment and security assessment. This paper analyzes the various security implications associated with deciding between mechanical and electronic locks for use in access control of physical premises.
-
Implicit Costs of Improper Security
-
For progressive enterprises, security has evolved from an IT issue to a central business issue, as most companies today are re- sponsible for protecting some form of digital asset, such as credit cards, customer data, business strategy, and intellectual prop- erty. As with all business concerns, cost management is of primary importance. With security however, the true cost does not lie in a typical budget line item expenditure; rather it stems from asset compromise (whose costs range from…
For progressive enterprises, security has evolved from an IT issue to a central business issue, as most companies today are re- sponsible for protecting some form of digital asset, such as credit cards, customer data, business strategy, and intellectual prop- erty. As with all business concerns, cost management is of primary importance. With security however, the true cost does not lie in a typical budget line item expenditure; rather it stems from asset compromise (whose costs range from litigation, to fines, to lost revenue, to incident response). Proper hardening techniques are much smaller expenditures in relation to breach re- sponse costs, and are effective in dramatically reducing likelihood of a successful attack.
The challenge for many companies is to understand which hardening efforts are most effective. Studies1 show that as many as 89% of CIOs express confidence in the effectiveness of their security practices, yet those practices often fail to account for evolved, modern adversaries. The black market2 for stolen digital assets has matured, and sophisticated adversaries with finan- cial motivations are incentivized to attack large companies who possess high value digital assets. Even when these adversaries are unsuccessful, incident response costs are significant – but when they are successful, the resulting damages skyrocket to stag- gering and potentially crippling heights.
Contained herein is an analysis of the different cost drivers as well as discussion of approaches to minimize exposure. -
Efficacy of Security Techniques Correlated to Perspective & Methodology
-
To improve the security posture of digital systems, progressive organizations engage third party security experts to as-sess risk and provide hardening guidance. The most suitable approach for most industries is white box vulnerability assessment. However, confusion about different security approaches has led IT executives to commonly request the notably ineffective approach of black box penetration testing. Most executives may be surprised to discover that this approach actually undermines…
To improve the security posture of digital systems, progressive organizations engage third party security experts to as-sess risk and provide hardening guidance. The most suitable approach for most industries is white box vulnerability assessment. However, confusion about different security approaches has led IT executives to commonly request the notably ineffective approach of black box penetration testing. Most executives may be surprised to discover that this approach actually undermines the very risk assessment objectives they seek to achieve. This article will analyze the trend, contrast different tests and methodologies, and outline best practices.
Other creatorsSee project
Honors & Awards
-
Boston Marathon Finisher
Boston Athletic Association
Finisher of the world's oldest, most prestigious, and most elite marathon, The Boston Marathon. Top fundraiser on charity team that raised $35,001 for Boston Partners in Education.
-
Executive of the Year
American Business Awards
The American Business Awards (ABA) has named Ted Harrington "Executive of the Year." Mr. Harrington is co-owner and Executive Partner of Independent Security Evaluators (ISE), and runs their west coast office out of San Diego. This year's ABA class received more than 3,400 nominations from 44 US states and 3 countries across 2 continents. Other winners from the 2016 class include from companies such as Qualcomm, Intuit, AT&T, 1-800-Flowers, Aflac, ZipCar, and more. Mr. Harrington was one of…
The American Business Awards (ABA) has named Ted Harrington "Executive of the Year." Mr. Harrington is co-owner and Executive Partner of Independent Security Evaluators (ISE), and runs their west coast office out of San Diego. This year's ABA class received more than 3,400 nominations from 44 US states and 3 countries across 2 continents. Other winners from the 2016 class include from companies such as Qualcomm, Intuit, AT&T, 1-800-Flowers, Aflac, ZipCar, and more. Mr. Harrington was one of five honorees named in the category of Computer Services.
-
Educational Program of the Year
Georgetown University Alumni Association
The Distinguished Author panel event was hosted by The Georgetown Club of San Diego at the beautiful $185M San Diego Central Library on Thursday May 7th from 5:00-7:00pm. The event was held in the glass-encased Mary Hollis Clark Conference Center off the lobby. Our author panel of award winning children’s book authors was Henry Herz (G’86), Cindy Jenson-Elliott and Salina Yoon, and they detailed their journey into the world of children’s literature, to include transitioning from…
The Distinguished Author panel event was hosted by The Georgetown Club of San Diego at the beautiful $185M San Diego Central Library on Thursday May 7th from 5:00-7:00pm. The event was held in the glass-encased Mary Hollis Clark Conference Center off the lobby. Our author panel of award winning children’s book authors was Henry Herz (G’86), Cindy Jenson-Elliott and Salina Yoon, and they detailed their journey into the world of children’s literature, to include transitioning from self-publishing to traditional publishing. Lois R. Fishman (L'93), previously an advisor to Disney Book Group as Assistant General Counsel, moderated the panel.
Stakeholders for this event were the board, the alumni, the author panel, the moderator, the City of San Diego, the Library Staff, and alumni affairs. The event was sold out to capacity. Attendees were offered an exclusive behind the scenes private library tour (including the rare books room), a distinguished author panel, complimentary garage, signed copies the authored books available for purchase, and refreshments that included wine and cheese. We delivered all of this for only $12 registration.
-
40 Under 40
SD Metro
Awarded to a select group of executives and leaders who have significantly impacted their organization, industry and region. At only 32 years old, was one of the youngest honorees in the class of inductees, and the only honoree from the information security field.
-
Cybersecurity Professional of the Year, Education [Finalist]
San Diego Business Journal
Nominated and judged by collection of peers, awarded to security professionals driving measurable change both in San Diego and beyond, across all industry verticals and security disciplines. Nominees are in 5 categories, for which I became a finalist in Education (other categories include Volunteer, Critical Infrastructure, Millenial, and Internet of Things)
-
Best Places to Work
Baltimore Magazine
Influential executive in building a culture and programs that qualified ISE for this distinction, awarded to companies that have created vibrant culture, robust benefits, and valiant corporate mission. Special items of note include ISE's unlimited vacation policy, above-average pay, time allocation for research and creative office space.
-
Industry Professional of the Year (Nominee)
BIA San Diego
Nominated for transformative efforts with build(SD)PAC, leadership as president of yGEN and overall committment to the building industry
Languages
-
Italian
-
Recommendations received
-
LinkedIn User
4 people have recommended Ted
Join now to viewMore activity by Ted
-
Heading to #BlackHat2024 for an incredible week with the Cyera crew to share how our AI-driven platform effortlessly discovers, analyzes, and…
Heading to #BlackHat2024 for an incredible week with the Cyera crew to share how our AI-driven platform effortlessly discovers, analyzes, and…
Liked by Ted Harrington
-
I recently was wandering around Riga (capital of Latvia) and found myself in this neighborhood that I really liked. I didn’t quite know why, but…
I recently was wandering around Riga (capital of Latvia) and found myself in this neighborhood that I really liked. I didn’t quite know why, but…
Shared by Ted Harrington
-
Really not sure what all the hype is about with the Turkish shooter in the Olympics... I've been trying to tell you all about the power of…
Really not sure what all the hype is about with the Turkish shooter in the Olympics... I've been trying to tell you all about the power of…
Liked by Ted Harrington
-
I'm back at the Gaylord Rockies in Denver, but this time I'm attending a conference— National Speakers Association— and not working one :) When I…
I'm back at the Gaylord Rockies in Denver, but this time I'm attending a conference— National Speakers Association— and not working one :) When I…
Liked by Ted Harrington
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Ted Harrington in United States
-
Ted Harrington
-
Ted Harrington
Finance Concentration at Boston College
-
Ted Harrington
Sales and Operations Leader at Alcon
-
Ted Harrington
34 others named Ted Harrington in United States are on LinkedIn
See others named Ted Harrington