Programming Throwdown
Patrick Wheeler and Jason Gauci
"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders. But what really is hacking? What does trust really mean and how do we acquire and keep trust on the Internet? It turns out that, while hacking is associated with computers, the methods behind it have been around since the dawn of time. Today we have Ted Harrington from ISE to dive deep into hacking, all the way from the medieval times to today.
00:00:15 Intro
00:01:25 Introducing Ted Harrington
00:07:10 Ethical Hackers, Non-Ethical Hackers, and Productivity
00:11:58 Starting out in Ethical Hacking/Security
00:14:40 Imposter Syndrome
00:19:34 What is Hacking?
00:30:48 Is Hacking like magic?
00:38:14 Defense in Depth
00:42:04 Earning trust and The Departed movie (Spoiler alert)
00:59:52 DEF CON® Hacking Conference
01:02:46 Tips on how not to get hacked
01:10:08 ISE.io culture and opportunities
01:24:13 Farewells
Resources mentioned in this episode:
Companies:
ISE (Independent Security Evaluators)
o Website: https://www.ise.io/
o Twitter: https://twitter.com/ISEsecurity
o Facebook: https://facebook.com/ISE.infosec
People:
Ted Harrington
o Website: https://www.tedharrington.com/
o LinkedIn: https://www.linkedin.com/in/securityted/
o Twitter: https://twitter.com/SecurityTed
Sponsor:
MParticle
o Website: https://www.mparticle.com/
If you’ve enjoyed this episode, you can listen to more on Programming Throwdown’s website: https://www.programmingthrowdown.com/
Reach out to us via email: programmingthrowdown@gmail.com
You can also follow Programming Throwdown on
Join the discussion on our Discord
Help support Programming Throwdown through our Patreon