5 critical security issues for 2017—and how to address them
TRANSCRIPT
![Page 1: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/1.jpg)
December 2016
![Page 2: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/2.jpg)
December 2016 2
Why Do We Exist?Platform That Connects Organizations to the Researcher Community
40,000+ Researchers
With specialized skills including web, mobile and IoT hacking. Our community is made up of tens of thousands of the hackers from around the world.
f
Organizations Both Big and Small
Making Bug Bounties easy for ever type of company through a variety of Bug Bounty Solutions.
![Page 3: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/3.jpg)
December 2016
A Radical Cyber Security Advantage
A Crowd That Thinks Like An Adversary But Acts Like an Ally to Find
Vulnerabilities
A Platform That Simplifies Connecting Researchers to Organizations
Security Expertise To Design, Support, and Manage Crowd Security Programs
Enterprise Bug Bounty Solutions & Hackers-On Demand
7 Bug Bounty Myths
![Page 4: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/4.jpg)
December 2016
2016: The Year of the Breach
* Identify Theft Resource Center 2016 Breach Stats Report as of 12/06
957 Breaches*
35,147,826 Records Exposed*
35,147,826Records Exposed*
![Page 5: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/5.jpg)
December 2016
IoT security is becoming every CISO’s problem
![Page 6: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/6.jpg)
December 2016
Pen Testing gets better in 2017 with the application of the crowd
![Page 7: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/7.jpg)
December 2016
Senior development and engineering leaders will embrace crowd sourced vulnerability testing as part of SDLC
![Page 8: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/8.jpg)
December 2016
Social Engineering, AI, and Machine Learning will change security planning forever but people remain a key source of protection
![Page 9: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/9.jpg)
December 2016
Crowdsourced vulnerability discovery becomes a mainstream aspect of any security program
![Page 10: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/10.jpg)
2017: The year of the…?
![Page 11: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/11.jpg)
December 2016
![Page 12: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/12.jpg)
December 2016
Next Steps
Talk with a bug bounty expert: Bugcrowd.com/chat-with-us
![Page 13: 5 Critical Security Issues for 2017—And How to Address Them](https://reader035.vdocuments.site/reader035/viewer/2022070602/587aa7331a28abed218b4b73/html5/thumbnails/13.jpg)
December 2016