Loading Events

« All Events

  • This event has passed.

Capitol of Texas ISSA July 2020 Chapter Meeting

July 15 @ 11:00 AM - 12:30 PM

This is a virtual event.

Hackable: How To Do Application Security Right

You’re building an application and need to prove it’s secure, and to do that you need to find vulnerabilities and fix them. However, there’s so much confusion about what that even means, let alone how to do it right, that it can be an uncertain and overwhelming endeavor. Author Ted Harrington takes you to the front lines of ethical hacking and security research, blending real-world exploit stories with actionable insights in order to help you understand how to break — and fix — applications. You’ll walk away with practical guidance about how to:

  • Abuse functionality
  • Chain vulnerabilities
  • Choose a testing approach & methodology
  • And much more

About the Speaker

Ted Harrington,

Executive Partner, Independent Security Evaluators

Ted Harrington is the author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for being the first to hack the iPhone. He’s overseen security research hacking medical devices, password managers, and cryptocurrency wallets. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year and 40 Under 40 . He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, and which represents the discovery of more than 300 zero-day vulnerabilities (and counting). Ted‘s work has been featured in more than 100 media outlets, including The New York Times, Financial Times, Wall Street Journal, Washington Post, and USA Today. Ted is a Boston Marathon finisher, and holds a Bachelor’s degree from Georgetown University, where he started his first company while a student.


11:00 AM Chapter Business

11:10 AM Presentation Begins (Ted)

11:30 AM Zoom Break-out Session (Attendees are broken into groups of four, Seth asks them to introduce themselves and gives them a topic from Ted’s talk to discuss)

11:35 AM Presentation Resumes (Ted)

11:50 AM Zoom Break-out Session (Attendees break out again, Seth gives them another topic from Ted’s talk to discuss)

11:55 AM Presentation Resumes (Ted)

12:10 PM Q&A (Ted and attendees)

12:15 PM Meeting Concludes


ISSA Capitol of Texas Chapter
© Copyright 2020, (ISC)² Austin Chapter. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, HCISPP and CBK are registered certification, service, and trademarks of International Information System Security Certification Consortium, Inc.

Disclaimer: (ISC)² does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks and trade dress is the property of (ISC)² Austin Chapter, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².”