Ted Harrington

Ted Harrington

Los Angeles, California, United States
13K followers 500+ connections

About

Hi, I'm Ted.

I've dedicated my career to ethical hacking, on a mission to help…

Articles by Ted

See all articles

Activity

Join now to see all activity

Experience

  • Independent Security Evaluators Graphic

    Independent Security Evaluators

    Los Angeles, California, United States

  • -

    Los Angeles, California, United States

  • -

    San Diego, California, United States

  • -

    Greater San Diego Area

  • -

    Baltimore, Maryland, United States

  • -

    San Diego, CA

  • -

    Vista, CA

  • -

    San Diego, CA

  • -

    San Diego, CA

  • -

    Washington, DC

Education

Courses

  • Abnormal Psychology

    PSYC-151

  • Cross-Cultural Communication

    LING-333

  • Ethics

    PHIL-050

  • European & Global Politics

    GOVT-329

  • Madness, Genius & Creativity

    PSCY-352

  • Modern Psychology

    PSYC-110

  • Motivation

    PSYC-131

  • Philosophy of Law

    PHIL-156

  • Psychology of Science

    PSYC-365

  • Psychopathology

    PSYC-353

  • Research Methods & Statistics

    PSCY-002

  • US, Middle East & Politics of War

    INAF-243

Projects

  • IoT Village

    Organized by security consulting and research firm Independent Security Evaluators (ISE), the ISE IoT Village will deliver thought leadership advocating for security advancements in Internet of Things devices. The village will consist of workshops on hacking numerous off-the-shelf devices including medical devices, home appliances, routers, and storage devices; live educational talks; and a variety of contests.

    Other creators
    See project
  • Connected Locking Systems: A Comparative Analysis of Mechanical vs. Electronic Access Control

    -

    Electronic locking mechanisms introduce new attack vectors as compared to mechanical locks, but if properly designed, there are no inherent flaws with systems that have such attack surfaces. Furthermore, hardened electronic locking systems introduce significant security upgrades over more traditionally deployed mechanical locks. However, the entire premise of security advantages in electronic locks is based on the condition that such a system has had security properly built in, as validated by…

    Electronic locking mechanisms introduce new attack vectors as compared to mechanical locks, but if properly designed, there are no inherent flaws with systems that have such attack surfaces. Furthermore, hardened electronic locking systems introduce significant security upgrades over more traditionally deployed mechanical locks. However, the entire premise of security advantages in electronic locks is based on the condition that such a system has had security properly built in, as validated by design assessment, implementation assessment and security assessment. This paper analyzes the various security implications associated with deciding between mechanical and electronic locks for use in access control of physical premises.

    See project
  • Implicit Costs of Improper Security

    -

    For progressive enterprises, security has evolved from an IT issue to a central business issue, as most companies today are re- sponsible for protecting some form of digital asset, such as credit cards, customer data, business strategy, and intellectual prop- erty. As with all business concerns, cost management is of primary importance. With security however, the true cost does not lie in a typical budget line item expenditure; rather it stems from asset compromise (whose costs range from…

    For progressive enterprises, security has evolved from an IT issue to a central business issue, as most companies today are re- sponsible for protecting some form of digital asset, such as credit cards, customer data, business strategy, and intellectual prop- erty. As with all business concerns, cost management is of primary importance. With security however, the true cost does not lie in a typical budget line item expenditure; rather it stems from asset compromise (whose costs range from litigation, to fines, to lost revenue, to incident response). Proper hardening techniques are much smaller expenditures in relation to breach re- sponse costs, and are effective in dramatically reducing likelihood of a successful attack.

    The challenge for many companies is to understand which hardening efforts are most effective. Studies1 show that as many as 89% of CIOs express confidence in the effectiveness of their security practices, yet those practices often fail to account for evolved, modern adversaries. The black market2 for stolen digital assets has matured, and sophisticated adversaries with finan- cial motivations are incentivized to attack large companies who possess high value digital assets. Even when these adversaries are unsuccessful, incident response costs are significant – but when they are successful, the resulting damages skyrocket to stag- gering and potentially crippling heights.

    Contained herein is an analysis of the different cost drivers as well as discussion of approaches to minimize exposure.

    See project
  • Efficacy of Security Techniques Correlated to Perspective & Methodology

    -

    To improve the security posture of digital systems, progressive organizations engage third party security experts to as-sess risk and provide hardening guidance. The most suitable approach for most industries is white box vulnerability assessment. However, confusion about different security approaches has led IT executives to commonly request the notably ineffective approach of black box penetration testing. Most executives may be surprised to discover that this approach actually undermines…

    To improve the security posture of digital systems, progressive organizations engage third party security experts to as-sess risk and provide hardening guidance. The most suitable approach for most industries is white box vulnerability assessment. However, confusion about different security approaches has led IT executives to commonly request the notably ineffective approach of black box penetration testing. Most executives may be surprised to discover that this approach actually undermines the very risk assessment objectives they seek to achieve. This article will analyze the trend, contrast different tests and methodologies, and outline best practices.

    Other creators
    See project

Honors & Awards

  • Boston Marathon Finisher

    Boston Athletic Association

    Finisher of the world's oldest, most prestigious, and most elite marathon, The Boston Marathon. Top fundraiser on charity team that raised $35,001 for Boston Partners in Education.

  • Executive of the Year

    American Business Awards

    The American Business Awards (ABA) has named Ted Harrington "Executive of the Year." Mr. Harrington is co-owner and Executive Partner of Independent Security Evaluators (ISE), and runs their west coast office out of San Diego. This year's ABA class received more than 3,400 nominations from 44 US states and 3 countries across 2 continents. Other winners from the 2016 class include from companies such as Qualcomm, Intuit, AT&T, 1-800-Flowers, Aflac, ZipCar, and more. Mr. Harrington was one of…

    The American Business Awards (ABA) has named Ted Harrington "Executive of the Year." Mr. Harrington is co-owner and Executive Partner of Independent Security Evaluators (ISE), and runs their west coast office out of San Diego. This year's ABA class received more than 3,400 nominations from 44 US states and 3 countries across 2 continents. Other winners from the 2016 class include from companies such as Qualcomm, Intuit, AT&T, 1-800-Flowers, Aflac, ZipCar, and more. Mr. Harrington was one of five honorees named in the category of Computer Services.

  • Educational Program of the Year

    Georgetown University Alumni Association

    The Distinguished Author panel event was hosted by The Georgetown Club of San Diego at the beautiful $185M San Diego Central Library on Thursday May 7th from 5:00-7:00pm. The event was held in the glass-encased Mary Hollis Clark Conference Center off the lobby. Our author panel of award winning children’s book authors was Henry Herz (G’86), Cindy Jenson-Elliott and Salina Yoon, and they detailed their journey into the world of children’s literature, to include transitioning from…

    The Distinguished Author panel event was hosted by The Georgetown Club of San Diego at the beautiful $185M San Diego Central Library on Thursday May 7th from 5:00-7:00pm. The event was held in the glass-encased Mary Hollis Clark Conference Center off the lobby. Our author panel of award winning children’s book authors was Henry Herz (G’86), Cindy Jenson-Elliott and Salina Yoon, and they detailed their journey into the world of children’s literature, to include transitioning from self-publishing to traditional publishing. Lois R. Fishman (L'93), previously an advisor to Disney Book Group as Assistant General Counsel, moderated the panel.

    Stakeholders for this event were the board, the alumni, the author panel, the moderator, the City of San Diego, the Library Staff, and alumni affairs. The event was sold out to capacity. Attendees were offered an exclusive behind the scenes private library tour (including the rare books room), a distinguished author panel, complimentary garage, signed copies the authored books available for purchase, and refreshments that included wine and cheese. We delivered all of this for only $12 registration.

  • 40 Under 40

    SD Metro

    Awarded to a select group of executives and leaders who have significantly impacted their organization, industry and region. At only 32 years old, was one of the youngest honorees in the class of inductees, and the only honoree from the information security field.

  • Cybersecurity Professional of the Year, Education [Finalist]

    San Diego Business Journal

    Nominated and judged by collection of peers, awarded to security professionals driving measurable change both in San Diego and beyond, across all industry verticals and security disciplines. Nominees are in 5 categories, for which I became a finalist in Education (other categories include Volunteer, Critical Infrastructure, Millenial, and Internet of Things)

  • Best Places to Work

    Baltimore Magazine

    Influential executive in building a culture and programs that qualified ISE for this distinction, awarded to companies that have created vibrant culture, robust benefits, and valiant corporate mission. Special items of note include ISE's unlimited vacation policy, above-average pay, time allocation for research and creative office space.

  • Industry Professional of the Year (Nominee)

    BIA San Diego

    Nominated for transformative efforts with build(SD)PAC, leadership as president of yGEN and overall committment to the building industry

Languages

  • Italian

    -

Recommendations received

4 people have recommended Ted

Join now to view

More activity by Ted

View Ted’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ted directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Ted Harrington in United States

Add new skills with these courses