SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
MEET THE HACKERS POWERING
THE WORLD’S BEST BUG
BOUNTY PROGRAMS
Adam Bacchus, Chief Bounty Officer
Lauren Koszarek, Dir. of Communications
Adam Bacchus serves as Chief Bounty Officer at HackerOne. Previously
Adam was a member of Snapchat’s security team. Before Snapchat,
Adam was on Google’s security team where he helped run Google’s
penetration testing and bug bounty programs. Adam’s previous
experience includes four years of security consulting, primarily in
application and network pentesting.
@sushihack
Lauren Koszarek is the Director of Communication at HackerOne.
Previously Lauren was a Security Communications Strategist for
Blackberry. Lauren has experience driving proactive and reactive
communications for brands including, Microsoft Trustworthy Computing,
T-Mobile and HTC, among other.
@LKozz
Adam Bacchus
Lauren Koszarek
● Hacking scalability
● Hacker survey data
● Hacker profiles
● 4 Reasons to work with
hackers
● Q&A
Today’s Agenda
Bug Bounty 101
HackerOne is the world’s #1 bug bounty platform
Strength in Numbers
Not even the strongest or most skilled
organizations have the headcount and capacity
to avert system vulnerabilities on their own.
Strength in
Numbers
Security experts
in your
organization
Strength in
Numbers
Security experts
in your
organization
Security experts among
all your vendors and
contractors
Strength in
Numbers
Security experts
in your
organization
Security experts among
all your vendors and
contractors
80,000+ white hat hackers
on HackerOne
Strength in Numbers
80,000 hackers strong
$10,000,000+ earned in bounties
32,000+ vulnerabilities resolved
600+ customers
Who Are These Hackers?
/ha–ker/: One who enjoys the intellectual
challenge of creatively overcoming
limitations. - MIT
Hackers ARE: Problem-solvers, Curious, Technically
skilled, Diverse in background and education
Hackers are NOT: Criminals. Using their skills for a
malicious purpose
11
Where in the world?
13
Not all hackers are created equal
Hacker Profiles
Hacker Profile : meals
Sean Melia | 26 years old | U.S.A.
● Pentesting 4+ years
● Bug bounties 2+ years
● Found 570+ bugs
“Bug bounties have changed my life significantly. I've been able
to purchase a house as well as go on trips and purchase nice
gifts for my family and girlfriend.”
Hacker Profile : nnwakelam
Nathaniel Wakelam | 21 years old |
Australia
● Self-taught bug hunter
● Bug bounties 3+ years
● Helped GM, Snapchat, Yahoo,
Uber and Adobe find 372+ bugs
● Uses bounties to fund his charity
Hackers helping hackers
‘Bug bounties have given me cash money, skills, sent me
around the world, and I've forged some lifelong friendships due
to taking part in them’
Hacker Profile : mlitchfield
Mark Litchfield | U.S.A.
● Hacking since ‘99
● 1st hacker to earn $500k+ on H1
● Helped Dropbox, Uber, Shopify and
many more resolve 450+ bugs
Mark chooses which bug bounty programs to work on
based on “How well do they respond, how quick do they
fix / pay.”
4 reasons to work
with hackers
1. Hackers Gonna
Hack
2. Enhanced Public
Image
3. “Always On” vs.
“Point in Time”
4. Find and Improve
Gaps in SDLC
Questions?
sales@hackerone.com
Thank you!
sales@hackerone.com

Weitere ähnliche Inhalte

Was ist angesagt?

Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 

Was ist angesagt? (20)

Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The Web
 
Saying Hello to Bug Bounty
Saying Hello to Bug BountySaying Hello to Bug Bounty
Saying Hello to Bug Bounty
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!
 
Introducing Bugcrowd
Introducing BugcrowdIntroducing Bugcrowd
Introducing Bugcrowd
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Bug Bounty for - Beginners
Bug Bounty for - BeginnersBug Bounty for - Beginners
Bug Bounty for - Beginners
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Bug bounty recon.pdf
Bug bounty recon.pdfBug bounty recon.pdf
Bug bounty recon.pdf
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Hackfest presentation.pptx
Hackfest presentation.pptxHackfest presentation.pptx
Hackfest presentation.pptx
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Owasp zap
Owasp zapOwasp zap
Owasp zap
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Ähnlich wie Meet the hackers powering the world's best bug bounty programs

mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdfmastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
ManiacH1
 
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 WinnersLaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
Stacy Feldman
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manas Das
 
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret SauceWhat Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
NTEN
 

Ähnlich wie Meet the hackers powering the world's best bug bounty programs (20)

LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdfmastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
ethics final project
ethics final projectethics final project
ethics final project
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
kiran.ppt
kiran.pptkiran.ppt
kiran.ppt
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 WinnersLaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
LaunchPad LI & LISTnet's "Launch Your Stars" 2013 Winners
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
SafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to LaunchSafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to Launch
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret SauceWhat Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
What Your E.D Needs to Know: Tech Infrastructure as Social Media Secret Sauce
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Iap2 Conference
Iap2 ConferenceIap2 Conference
Iap2 Conference
 

Mehr von HackerOne

Mehr von HackerOne (15)

Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
 

Kürzlich hochgeladen

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Kürzlich hochgeladen (20)

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 

Meet the hackers powering the world's best bug bounty programs

  • 1. MEET THE HACKERS POWERING THE WORLD’S BEST BUG BOUNTY PROGRAMS Adam Bacchus, Chief Bounty Officer Lauren Koszarek, Dir. of Communications
  • 2. Adam Bacchus serves as Chief Bounty Officer at HackerOne. Previously Adam was a member of Snapchat’s security team. Before Snapchat, Adam was on Google’s security team where he helped run Google’s penetration testing and bug bounty programs. Adam’s previous experience includes four years of security consulting, primarily in application and network pentesting. @sushihack Lauren Koszarek is the Director of Communication at HackerOne. Previously Lauren was a Security Communications Strategist for Blackberry. Lauren has experience driving proactive and reactive communications for brands including, Microsoft Trustworthy Computing, T-Mobile and HTC, among other. @LKozz Adam Bacchus Lauren Koszarek
  • 3. ● Hacking scalability ● Hacker survey data ● Hacker profiles ● 4 Reasons to work with hackers ● Q&A Today’s Agenda
  • 4. Bug Bounty 101 HackerOne is the world’s #1 bug bounty platform
  • 5. Strength in Numbers Not even the strongest or most skilled organizations have the headcount and capacity to avert system vulnerabilities on their own.
  • 7. Strength in Numbers Security experts in your organization Security experts among all your vendors and contractors
  • 8. Strength in Numbers Security experts in your organization Security experts among all your vendors and contractors 80,000+ white hat hackers on HackerOne
  • 9. Strength in Numbers 80,000 hackers strong $10,000,000+ earned in bounties 32,000+ vulnerabilities resolved 600+ customers
  • 10. Who Are These Hackers? /ha–ker/: One who enjoys the intellectual challenge of creatively overcoming limitations. - MIT Hackers ARE: Problem-solvers, Curious, Technically skilled, Diverse in background and education Hackers are NOT: Criminals. Using their skills for a malicious purpose
  • 11. 11 Where in the world?
  • 12.
  • 13. 13
  • 14.
  • 15.
  • 16. Not all hackers are created equal
  • 18. Hacker Profile : meals Sean Melia | 26 years old | U.S.A. ● Pentesting 4+ years ● Bug bounties 2+ years ● Found 570+ bugs “Bug bounties have changed my life significantly. I've been able to purchase a house as well as go on trips and purchase nice gifts for my family and girlfriend.”
  • 19. Hacker Profile : nnwakelam Nathaniel Wakelam | 21 years old | Australia ● Self-taught bug hunter ● Bug bounties 3+ years ● Helped GM, Snapchat, Yahoo, Uber and Adobe find 372+ bugs ● Uses bounties to fund his charity Hackers helping hackers ‘Bug bounties have given me cash money, skills, sent me around the world, and I've forged some lifelong friendships due to taking part in them’
  • 20. Hacker Profile : mlitchfield Mark Litchfield | U.S.A. ● Hacking since ‘99 ● 1st hacker to earn $500k+ on H1 ● Helped Dropbox, Uber, Shopify and many more resolve 450+ bugs Mark chooses which bug bounty programs to work on based on “How well do they respond, how quick do they fix / pay.”
  • 21. 4 reasons to work with hackers
  • 24. 3. “Always On” vs. “Point in Time”
  • 25. 4. Find and Improve Gaps in SDLC