She earned her Bachelor of Science degree in Mechanical Engineering from the University of Idaho. Camille Eddy is a Product Engineer and International Public Speaker. Additionally, she is one of the Business Insider’s 50 Power Players. She is an international keynote speaker at major information security and tech conferences and events, and serves as a trusted source to reporters and editors, such as Forbes and Business Insider.
Defcon black badge how to#
This talk discusses why we need representation on the leadership team, and how to get involved to actually bring a change to an industry that has run out of time to become more inclusive.Ĭhloé Messdaghi is a tech changemaker who is innovating tech and information security sectors to meet today’s and future’s demands by accelerating startups and providing solutions that empower. Where the company takes actions and voices are finally heard because there’s representation, and it's reflected in the vision, company policies, and hiring practices. Research has repeatedly shown that when we have diverse boards and c-level positions held by marginalized persons, it produces a trickle down effect. When we shift to incorporating DEI practices by making sure representation is present on the leadership team, board and c-suite, it recognizes the voices of marginalized identities: ethnicities, genders, generations, sexuality, and abilities. It's time to increase representation of marginalized identities from less than 20% to 50%+ for all levels in tech.
![defcon black badge defcon black badge](http://eecue.com/i/Defcon-19-UBER-Badge-eecue_32541_5st5_l.jpg)
Yet, still to this day less than 20% of company boards represent marginalized identities. One way to see if a company is trying to be better on DEI is reflected on the board and C-suite. Stories of those who are marginalized in tech showcasing we still have a large problem with companies practicing lip service and no actual actions to show for it. However, there are plenty of examples where DEI that is being promoted is not actually happening behind scenes. We often hear about the importance of Diversity, Equity, and Inclusion (DEI) and how companies are striving to do better. He hosts the Tech Done Different podcast. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. He’s helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix.
Defcon black badge password#
Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers.
![defcon black badge defcon black badge](https://roboticarts.files.wordpress.com/2014/08/img_5239.jpg)
As a result, you’ll leave with new ideas about how to build better, more secure systems. By design, this keynote is more strategic rather than technical, and will equip you with insights to think differently about your security testing program.
![defcon black badge defcon black badge](https://hackaday.com/wp-content/uploads/2018/08/dc26-badge-and-terminal.jpg)
Drawing insights from the #1 bestselling book Hackable, you’ll learn why the distinction matters, and you’ll get an insight into the more advanced tactics used by ethical hackers, such as functionality abuse and exploit chaining. In this keynote, you’ll learn the often widely misunderstood difference about what penetration testing is (and is not).
![defcon black badge defcon black badge](http://eecue.com/i/wall-of-sheep-eecue_31761_b9k8_l.jpg)
So where does that leave you? What is your security testing program actually doing (and not doing)? When companies want to build secure IoT systems, they know they need to test their system for security flaws, which typically leads them to seek out “penetration testing.” However, this term has become so misused across the security community that it’s hard to decipher what is really happening. When Penetration Testing Isn’t Penetration Testing At All