Request a Demo Contact Us
Bugcrowd Named a Leader in GigaOm’s Pen Test as a Service Report
Read Now

A Day in the Life of a Pen Tester Part 3

A Day in the Life of a Pen Tester Part 3

 

Hosted by pen tester and Bugcrowd Ambassador, Phillip Wylie, this webinar series takes an inside look at pen testing best practices and trends with experts in the field.

Watch this episode where Wylie chats with Alyssa Miller, head of the Information Security Solutions practice at CDW; Wirefall, founder of the Dallas Hackers Association; and Bryan McAninch, a cybersecurity professional with over twenty years’ experience.

More about this episode’s guests:

Alyssa Miller (@AlyssaM_InfoSec) is a hacker, security evangelist, and professional with over 15 years of experience security and consulting. She is an experienced speaker on security topics and is currently head of the Information Security Solutions practice at CDW.

Wirefall (@DHAhole) is the founder of the Dallas Hackers Association, a BSides DFW board member, and chief consultant for the security startup, Telesploit. He has been focused on attack and penetration testing since the mid-90s.

Bryan McAninch (@bryanmcaninch) is a cybersecurity professional with over twenty years’ experience in various disciplines including digital forensics, penetration testing, and security architecture. His current area of research is focused on the security implications of cloud, container, and artificial intelligence technologies. He is an organizer of the North Texas Cyber Security Group, a member of the Dallas Hackers Association, SANS instructor, Frisco ISD mentor, and founder of Prevade Cybersecurity. Bryan is CISSP, SANS GPEN, SABSA CSA, and AWS CSA certified.

More resources

Report

Cybersecurity Vulnerabilities in the Technology Sector

Read More
Guide

Anatomy of a Bug Bounty Brief

Read More
Webinar

Shorten Your Software Vulnerability Remediation by Over 35%

Watch Now

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.