Episode Thumbnail
Episode 27  |  23:34 min

Episode 27: On Bug Bounties and Hacking the Pentagon

Episode 27  |  23:34 min  |  11.25.2019

Episode 27: On Bug Bounties and Hacking the Pentagon

00:00
00:00
This is a podcast episode titled, Episode 27: On Bug Bounties and Hacking the Pentagon. The summary for this episode is: Not all that long ago, bounty hunters were burly guys who apprehended fugitives using brute force in exchange for a reward or "bounty." And while those types of bounty hunters still exist, these days the vast majority of them are hackers looking for bugs. In this episode of the Impact Podcast, Jon Prial talks with Katie Moussouris, a highly regarded computer security researcher who's best known for creating the bug bounty program at Microsoft. You'll hear about: -Results from the recent Hack the Pentagon Program (1:15) -What companies can learn from the government’s approach to engaging with the hacker community (2:36) -How to determine if your organization is ready for a bug bounty program (5:40) -Issues larger enterprises face versus smaller startups (7:20) -Maturity models for assessing vulnerability (11:28) -Best practices for engineering teams (14:54) -The keys to success for bug bounty programs going forward (17:44)
Not all that long ago, bounty hunters were burly guys who apprehended fugitives using brute force in exchange for a reward or "bounty." And while those types of bounty hunters still exist, these days the vast majority of them are hackers looking for bugs. In this episode of the Impact Podcast, Jon Prial talks with Katie Moussouris, a highly regarded computer security researcher who's best known for creating the bug bounty program at Microsoft. You'll hear about: -Results from the recent Hack the Pentagon Program (1:15) -What companies can learn from the government’s approach to engaging with the hacker community (2:36) -How to determine if your organization is ready for a bug bounty program (5:40) -Issues larger enterprises face versus smaller startups (7:20) -Maturity models for assessing vulnerability (11:28) -Best practices for engineering teams (14:54) -The keys to success for bug bounty programs going forward (17:44)

More Episodes

An Introduction to Self-Sovereign Identity with Northern Block CEO Mathieu Glaude

An Introduction to Self-Sovereign Identity with Northern Block CEO Mathieu Glaude

Building  Effective Cybersecurity Defenses with eSentire's CTO Dustin Hillard

Building Effective Cybersecurity Defenses with eSentire's CTO Dustin Hillard

Detecting Cybersecurity Threats with Devo's CEO Marc van Zadelhoff

Detecting Cybersecurity Threats with Devo's CEO Marc van Zadelhoff

What's Identity Authentication and How Does It Work? ft. Trusona's CTO John Summers

What's Identity Authentication and How Does It Work? ft. Trusona's CTO John Summers

Navigating the Cybersecurity Landscape with CISO Alex Manea

Navigating the Cybersecurity Landscape with CISO Alex Manea

Rewind CEO Mike Potter On Backing up the Cloud, the Risk 3rd Party Applications Pose & Building a Time Machine for SaaS Apps

Rewind CEO Mike Potter On Backing up the Cloud, the Risk 3rd Party Applications Pose & Building a Time Machine for SaaS Apps