Scaling crowdsourced security knowledge through automation
Hear from representatives at Detectify Crowdsource on their crowdsourcing model and how they source vulnerabilities through automation.
What you'll learn:
- How to scale vulnerability sourcing through Detectify Crowdsource.
- The pros and cons of different models of sourcing vulnerabilities, including pentesting, bug bounty programs, responsible disclosure programs and automated scanners.
- Q&A session.
VP Product, Detectify
Security Research Tech Lead, Detectify