What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.
Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.
Impactful Moments:
00:00 - Intro
03:15 - The four traits of a hacker mindset
07:40 - Hacking the first iPhone and Tesla
11:50 - Why penetration testing is misunderstood
16:30 - Risks and realities of AI deepfakes
21:20 - Applying hacker traits to entrepreneurship
28:45 - Ted’s upcoming book: Inner Hacker
33:00 - Why mindset matters most
Links:
Connect with our guest, Ted Harrington: / securityted
Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-A...
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
/ hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(20) {
["gcGODFDG8VA"]=>
object(stdClass)#7582 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "gcGODFDG8VA"
["related_video_title"]=>
string(58) "Hacking Trust with AI and Deepfakes featuring Iain Jackson"
["posted_time"]=>
string(28) "11 месяцев назад"
["channelName"]=>
NULL
}
["iMwHFBebLYY"]=>
object(stdClass)#7593 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "iMwHFBebLYY"
["related_video_title"]=>
string(68) "Why you need to think like a hacker | Ted Harrington | TEDxFrankfurt"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["7q2Qzn1_-WU"]=>
object(stdClass)#7580 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7q2Qzn1_-WU"
["related_video_title"]=>
string(180) "Белый хакер разбирает сцены из фильмов «Хакеры», «Матрица», «Мистер Робот», «Черное зеркало» и др"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["blWdjRUPP6E"]=>
object(stdClass)#7590 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(27) "5 месяцев назад"
["channelName"]=>
NULL
}
["lamV82lBOh4"]=>
object(stdClass)#7574 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lamV82lBOh4"
["related_video_title"]=>
string(22) "POS: Point of Software"
["posted_time"]=>
string(21) "8 дней назад"
["channelName"]=>
NULL
}
["BT38K6NqETE"]=>
object(stdClass)#7589 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BT38K6NqETE"
["related_video_title"]=>
string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках"
["posted_time"]=>
string(28) "11 месяцев назад"
["channelName"]=>
NULL
}
["NnZPRpNXQFw"]=>
object(stdClass)#7578 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NnZPRpNXQFw"
["related_video_title"]=>
string(48) "The Hacker Mindset | Tim Summers | TEDxRochester"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
NULL
}
["RHxuUQ58yjc"]=>
object(stdClass)#7585 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "RHxuUQ58yjc"
["related_video_title"]=>
string(79) "ЭТИ АЛГОРИТМЫ СДЕЛАЮТ ИЗ ТЕБЯ ПРОГРАММИСТА"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["PwKUw5ljc2o"]=>
object(stdClass)#7568 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "PwKUw5ljc2o"
["related_video_title"]=>
string(79) "Школьник Взломал Playstation, но его Спасли Anonymous"
["posted_time"]=>
string(22) "22 часа назад"
["channelName"]=>
NULL
}
["KS_lrBH1HV8"]=>
object(stdClass)#7591 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "KS_lrBH1HV8"
["related_video_title"]=>
string(31) "Get Into The Attacker's Mindset"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["cn4NecH-yds"]=>
object(stdClass)#7581 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "cn4NecH-yds"
["related_video_title"]=>
string(106) "Может ли ИИ управлять вашим SOC лучше вас? С Ахмедом Аччаком"
["posted_time"]=>
string(24) "20 часов назад"
["channelName"]=>
NULL
}
["oDGydfWkVhI"]=>
object(stdClass)#7587 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "oDGydfWkVhI"
["related_video_title"]=>
string(51) "The Art of Problem-Solving | Len Bertain | TEDxCWRU"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["GffP5zov2Kc"]=>
object(stdClass)#7575 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "GffP5zov2Kc"
["related_video_title"]=>
string(53) "How to Think Like a Hacker (Build the HACKER mindset)"
["posted_time"]=>
string(27) "6 месяцев назад"
["channelName"]=>
NULL
}
["RJfZlFysyYM"]=>
object(stdClass)#7573 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "RJfZlFysyYM"
["related_video_title"]=>
string(34) "The Hacker's Mindset for Beginners"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["RE6_Lo2wSIg"]=>
object(stdClass)#7571 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "RE6_Lo2wSIg"
["related_video_title"]=>
string(106) "Что такое управление уязвимостями? (объяснение экспертов)"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
["3D6gaawXwfk"]=>
object(stdClass)#7572 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "3D6gaawXwfk"
["related_video_title"]=>
string(27) "Using AI to become a Hacker"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["CV39QzFpJx4"]=>
object(stdClass)#7569 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CV39QzFpJx4"
["related_video_title"]=>
string(67) "Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
NULL
}
["lyjmjSVmQAQ"]=>
object(stdClass)#7570 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lyjmjSVmQAQ"
["related_video_title"]=>
string(103) "Как ИИ без тормозов помогает преступникам | Первый отдел"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["A7sRQHNTAAU"]=>
object(stdClass)#7558 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "A7sRQHNTAAU"
["related_video_title"]=>
string(31) "DON'T call yourself a hacker..."
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
["eYaHmlHriXE"]=>
object(stdClass)#7559 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "eYaHmlHriXE"
["related_video_title"]=>
string(0) ""
["posted_time"]=>
string(25) "4 недели назад"
["channelName"]=>
NULL
}
}