Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frontline Tips for Managing a High-Performing Bug Bounty Program Dane Sherrats, Sr. Solutions Architect and Will Kapcio, Senior Solutions Engineer at HackerOne A well-designed and purposefully run bug bounty program can have a tremendous impact on your organization's attack resistance. A few fundamental steps... 1 week ago | 58 mins EMEA Cyber Threat Intelligence Webinar – Season 2 – Episode 8 Damian Chung, Andrew William, Johan Dryer, Nishaan Sccaram In this insightful episode of the EMEA Threat Intelligence Webinar, we were privileged to host Damian Chung, Business Information Security Officer at ... 2 weeks ago | 58 mins LinkedIn's Journey to Building A Successful Bug Bounty Program Surbhi Jain - Staff Security TPM, Ameen Mali - Staff Security Engineer Join us in this WiCyS strategic partner webinar with LinkedIn for an exciting journey through the evolution of LinkedIn's bug bounty program. Discover... 4 weeks ago | 30 mins The Impact of Preemptive Security Alex Rice, CTO and Co-founder at HackerOne and Suha Can, CISO at Grammarly Grammarly Shares How It Pinpoints the Most Critical Flaws in Its Attack Surface with Help from Ethical Hackers. As a company selling writing assistant... June 15, 2023 3:00pm An introduction to Bug Bounty Programs Stijn Jans The need for modern, proactive security has never been more important. A simple yet proven method to protecting against cyber threats is to invite eth... 3 months ago | 57 mins How Security Researchers Strengthen the DOD's Security Corben Leo, a security researcher from the Hack U.S. program, will talk with HackerOne’s CTO Alex Rice On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services (DDS), DoD Cyber Crime Center (DC3), and ... 3 months ago | 51 mins Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 5 months ago | 59 mins Wanted Hacked or Patched: Bug Bounties for Third Party Open-Source libraries Chujiao Ma, Senior Security R&D Engineer, Comcast Open-source software components (OSCs) are used in commercial software development across a slew of industry sectors from communications to finance. B... 8 months ago | 33 mins Adding a Bug Bounty Program to our Security Portfolio Security Panel: Ola Nordstrom and Christopher Vickery - Moderator: Pat Patterson Protection of the customer data entrusted to us is paramount. Yet daily, new threats arise and we employ a wide variety of tools and techniques to sta... 1 year ago | 44 mins Insights from Intel's Bug Bounty Program Katie Noble, Director, PSIRT & Bug Bounty, Intel Kate Samaraev, Account Manager, Enterprise, HackerOne Hear how bug bounty plays a role in Intel's security posture and how insights from their program leads to more secure products. 1 year ago | 20 mins Load more