Detectify Crowdsource

Scaling crowdsourced security knowledge through automation

Hear from representatives at Detectify Crowdsource on their crowdsourcing model and how they source vulnerabilities through automation.

By clicking “Play” to view this video, I consent to Detectify sending me marketing communication via email. I may opt out at any time. View Privacy Policy.

What you'll learn:

  • How to scale vulnerability sourcing through Detectify Crowdsource.
  • The pros and cons of different models of sourcing vulnerabilities, including pentesting, bug bounty programs, responsible disclosure programs and automated scanners.
  • Q&A session.


Johanna Ydergård

VP Product, Detectify

Tom Hudson

Security Research Tech Lead, Detectify