Training

Cybercrime , Data Loss Prevention (DLP) , Email Threat Protection

Modern Use Cases for Crowdsourced Security: Go Beyond Bug Bounty

Modern Use Cases for Crowdsourced Security: Go Beyond Bug Bounty

Crowdsourced security has its roots in the bug bounty movement, which emerged years ago. Since then, it's become much more versatile, enhancing numerous security workflows (pen testing, ASM, etc.), and for many adopters, joining the mainstream development lifecycle.

In this webinar, you'll learn:

  • About integrating crowdsourcing with your existing dev and security processes
  • Modern use cases for crowdsourced security that go beyond bug bounty
  • The difference between generalist crowds and curated crowds
  • How it contributes to continuous, shift-left security


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.