Detectify Crowdsource

Scaling crowdsourced security knowledge through automation

Hear from representatives at Detectify Crowdsource on their crowdsourcing model and how they source vulnerabilities through automation.

What you'll learn:

  • How to scale vulnerability sourcing through Detectify Crowdsource.
  • The pros and cons of different models of sourcing vulnerabilities, including pentesting, bug bounty programs, responsible disclosure programs and automated scanners.
  • Q&A session.

Speakers

Johanna Ydergård

VP Product, Detectify

Tom Hudson

Security Research Tech Lead, Detectify