Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Think Like a Hacker [Workshop] Cory Kennedy, Stewart Moody, Carrie Mulcahy Do you want to reduce threat exposure and minimize attack surface? If yes, join SecurityScorecard’s world class threat hunter Cory Kennedy as he shows... March 30, 2023 4:00pm An introduction to Bug Bounty Programs Stijn Jans The need for modern, proactive security has never been more important. A simple yet proven method to protecting against cyber threats is to invite eth... 4 weeks ago | 57 mins How Security Researchers Strengthen the DOD's Security Corben Leo, a security researcher from the Hack U.S. program, will talk with HackerOne’s CTO Alex Rice On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services (DDS), DoD Cyber Crime Center (DC3), and ... 2 weeks ago | 51 mins Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 2 months ago | 59 mins Live Analysis: 2022 Hacker Powered Security Report: Insights and Takeaways Alex Rice, CTO, HackerOne, Chris Evans, CISO HackerOne, and Jonathan Bouman, Hacker For the past six years, HackerOne has been surveying ethical hackers to get their perspective on the cybersecurity landscape, the evolution of risk, a... April 12, 2023 5:30pm How Pentest as a Service Fits Into a Modern Application Security Strategy Sean Ryan, Sr. Product Marketing Manager and Howard Holton, CTO, GigaOm Join this fireside chat with Howard Holton, CTO of GigaOm, to learn how Pentest as a Service (PTaaS) aligns to modern digital business cycles and fits... 2 weeks ago | 60 mins Ask a Hacker in 2023 Joel Noguera, Douglas Day, Sean Melia, Jon Colston, and Chris Evans In this session, some of world’s top ethical hackers share everything you've ever wanted to know. Hear about their most exciting find, learn about the... 1 month ago | 30 mins Wanted Hacked or Patched: Bug Bounties for Third Party Open-Source libraries Chujiao Ma, Senior Security R&D Engineer, Comcast Open-source software components (OSCs) are used in commercial software development across a slew of industry sectors from communications to finance. B... 6 months ago | 33 mins Insights from Intel's Bug Bounty Program Katie Noble, Director, PSIRT & Bug Bounty, Intel Kate Samaraev, Account Manager, Enterprise, HackerOne Hear how bug bounty plays a role in Intel's security posture and how insights from their program leads to more secure products. 1 year ago | 20 mins Adding a Bug Bounty Program to our Security Portfolio Security Panel: Ola Nordstrom and Christopher Vickery - Moderator: Pat Patterson Protection of the customer data entrusted to us is paramount. Yet daily, new threats arise and we employ a wide variety of tools and techniques to sta... 11 months ago | 44 mins Load more