Detectify Crowdsource
Scaling crowdsourced security knowledge through automation
Hear from representatives at Detectify Crowdsource on their crowdsourcing model and how they source vulnerabilities through automation.
What you'll learn:
- How to scale vulnerability sourcing through Detectify Crowdsource.
- The pros and cons of different models of sourcing vulnerabilities, including pentesting, bug bounty programs, responsible disclosure programs and automated scanners.
- Q&A session.
Speakers
![](/assets/resources/webinars/detectify-johanna-ydergard.png)
Johanna Ydergård
VP Product, Detectify
![](/assets/resources/webinars/Tom-Hudson-Detectify.png)
Tom Hudson
Security Research Tech Lead, Detectify