skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.


Demystifying Program Management in Crowdsourced Security

Over the past year, we’ve seen a 21% increase in total vulnerabilities, 20% of which were classified as critical. Compounded with the industry’s shortage in cybersecurity practitioners and ineffective security architectures, crowdsourced security testing programs like bug bounties and vulnerability disclosure continue to increase in adoption across industries and governments.

But running a bug bounty program on your own can be difficult. Imagine receiving hundreds of vulnerability submissions weekly, many of them unimportant, and many of them duplicates of known vulnerabilities. Organizations hardly have the time or resources to triage and validate incoming vulnerability findings from outside researchers.

Success in crowdsourced security relies on expert program management. Join Invision’s VP of Information Security, Johnathan Hunt and Bugcrowd’s CSO David Baker for a discussion on the value of bug bounty program management:

– How program management brings ROI to your bug bounty program
– Requirements for bug bounty program management
– How Invision went from a competitive self-managed program to a Bugcrowd managed program

Back To Top