Next-Generation Technologies & Secure Development , Threat Intelligence , Threat Modeling
We Make It, You Break It: Why Enterprises Are Investing in Bug Hunters to Intentionally Hack Their Systems
Crowdsourced cybersecurity, specifically bounty-based collaboration between organizations and white-hat hackers, is a burgeoning method of security reinforcement utilized by tech giants such as Google, Apple, and Microsoft, as well as other major companies in recent years.
Instead of awaiting a malicious breach, these companies are hiring professional bug hunters and researchers to locate security vulnerabilities in a controlled environment for a reward.
The strength of bug bounties lies the pay-for-performance model that incentivizes results. View this session now to learn:
- The benefits of a third-party perspective on your security program;
- What motivates the security researcher community;
- How to get your Board to see the value of building relationships with this community to build an impactful crowdsourced security program.