Episode 27: On Bug Bounties and Hacking the Pentagon

Episode 27 November 25, 2019 00:23:34
Episode 27: On Bug Bounties and Hacking the Pentagon
The Georgian Impact Podcast | AI, ML & More
Episode 27: On Bug Bounties and Hacking the Pentagon

Nov 25 2019 | 00:23:34

/

Hosted By

Jon Prial

Show Notes

Not all that long ago, bounty hunters were burly guys who apprehended fugitives using brute force in exchange for a reward or "bounty." And while those types of bounty hunters still exist, these days the vast majority of them are hackers looking for bugs. In this episode of the Impact Podcast, Jon Prial talks with Katie Moussouris, a highly regarded computer security researcher who's best known for creating the bug bounty program at Microsoft. You'll hear about: -Results from the recent Hack the Pentagon Program (1:15) -What companies can learn from the government’s approach to engaging with the hacker community (2:36) -How to determine if your organization is ready for a bug bounty program (5:40) -Issues larger enterprises face versus smaller startups (7:20) -Maturity models for assessing vulnerability (11:28) -Best practices for engineering teams (14:54) -The keys to success for bug bounty programs going forward (17:44)

Other Episodes

Episode 2

February 04, 2022 00:26:56
Episode Cover

McMaster University’s Vass Bednar Explains How Privacy, Public Policy and Innovation Intersect

In this episode, we have a wide-ranging discussion on privacy, competition and advertising with Vass Bednar. Vass is the Executive director of McMaster University's...

Listen

Episode 21

December 11, 2020 00:37:31
Episode Cover

Tackling Digital Disinformation with Kathryn Harrison

It used to be you could trust what you saw. With the prevalence of deep fakes and other synthetic media, today it isn’t always...

Listen

Episode 69

November 25, 2019 00:21:43
Episode Cover

Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill

How does your company think about security? Have you adopted basic security hygiene practices like running off-the-shelf software to scan your code for vulnerabilities,...

Listen