0      0


Attracting the Hacker—Bug Bounties and Coordinated Vulnerability Disclosures


Nov 17, 2020 10:45am ‐ Nov 17, 2020 12:00pm



Credits: None available.

Description

In the past, IT was driving the tools for the business. Today, “the IT” no longer exists. Tools are selected and implemented by business users. The main driver is digital transformation—supported by widespread, cheap and ubiquitous technology. At the same time traditional security also is being “digitally transformed” as these new landscapes also expand cyberspace attack surfaces.

Ideally, companies have a well-established cyber defense; in reality, they are often reactive, slow and provide limited visibility of the attack surface, allowing hackers to be that one step ahead. That’s why companies should turn the tables and pay these hackers to challenge the security surrounding products and services. A bug bounty program supports this by opening a path for them to legally monetize their findings.

Speaker(s):

  • Julia Hermann, CISSP, CCSP, CISM, CDPSE, Head of Security Architecture and Cyber Defense, Giesecke+Devrient GmbH

Credits

Credits: None available.

You must be logged in and own this session in order to post comments.