The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
As crowdsourced security approaches its 10 year anniversary we look at how it's changed the pentesting landscape to date. We'll cover pros and cons of crowdsourced security compared to traditional pentesting and where it can be best leveraged within your business (if at all). The recent weaponization of crowdsourced security in the Ukraine conflict will also be examined as an example of how crowdsourced security can go wrong and the collateral damage this can cause to innocent bystanders.
Learning Objectives:
Understand what crowdsourced security is
Learn the pros and cons of crowdsourced security compared to traditional pentesting
Appreciate how crowdsourced security can go wrong if used incorrectly