KEEP CALM & STAY SECURE 

Registration is closed.

Why (and How) To Think Like a Hacker

In this session, Proofpoint Resident CISO Deborah Watson chats with Ted Harrington, the #1 best-selling author of Hackable: How to Do Application Security Right. As a leader of ethical hackers, Ted has helped some of the world's foremost technology pioneers defend against attackers, and he's here to tell you stories about what they're doing right (and what they're doing wrong).

You'll learn:

  • What it means to "think like a hacker"
  • The 6 stage process attackers (and ethical hackers) go through to find exploitable vulnerabilities
  • What to do about it
  • And much more, to be discussed in fireside chat between Deborah and Ted
 
As a 'Thank You' attendees will receive a $25 virtual gift card to redeem at a location of your choice from our prize library.

Speaker Bio



Ted Harrington is a leader of ethical hackers, helping companies build better, more secure software. Ted is also an author, keynote speaker, consultant, and podcast host, specializing in penetration testing, secure software development, and related areas of cybersecurity. Ted is also the #1 best-selling author of Hackable: How to Do Application Security Right. Ted also runs Independent Security Evaluators (ISE), the elite security researchers who pioneered car hacking, were first to exploit the iPhone, pioneers medical device hacking, and run hacking event IoT Village. 




Deborah Watson is a cybersecurity leader, focused on Corporate Information Security Strategy, Compliance, Security Architecture, and Data Protection. She has almost 20 years of experience in the information technology and security fields. Deborah has a Master’s degree in Information Technology Management from Harvard University and is working to complete her Doctorate in Psychology (PsyD) from California Southern University. While Ms. Watson’s most recent expertise includes security strategy, security privacy, and data protection, security architecture, and compliance. She also has experience in infrastructure security design, endpoint hardening, threat and vulnerability management, risk analysis, business continuity, and project management.