Santa Clara University's Playbook
Inspired by Kristen Dietiker, CISO at Santa Clara University
Get Started
What You'll Need
- Bug Bounty
- Triage Services
- Bug Bounty
- Triage Services
What You'll Learn
- How to build a business case for “why bug bounty” and “why change now”
- Build a student-driven private bug bounty program that supports career development
- How to build a business case for “why bug bounty” and “why change now”
- Build a student-driven private bug bounty program that supports career development
Defining the Challenge
University CISOs tend to share Kristen’s challenges:
- Small security teams with complex or distributed environments
- Blind spots across academic and research systems
- Students are already curious and testing systems (without structure)
University CISOs tend to share Kristen’s challenges:
- Small security teams with complex or distributed environments
- Blind spots across academic and research systems
- Students are already curious and testing systems (without structure)
Solution
Launch a private bug bounty program on HackerOne with a select group of students as researchers
Launch a private bug bounty program on HackerOne with a select group of students as researchers
How Universities can launch a student-driven Bug Bounty program
Why This Playbook Exists
Higher education institutions face a unique mix of challenges: decentralized environments, small security teams, limited visibility into academic systems, and students hungry for skill development. This playbook exists to enable universities to protect their campus and foster hands-on cybersecurity learning opportunities for students, using an ethical and sustainable bug bounty program on HackerOne.
Kristen Dietiker brought her internal stakeholders together around two goals:
- Scalable security coverage in a decentralized environment
- Student development through ethical, hands-on experience
1. Mission alignment
Tie the program to the university’s educational values.
2. Low barriers to adoption
Leadership responds well when:
- The program is private (only students/staff)
- Risk is controlled
- Costs are predictable
- HackerOne triages reports, ensuring capacity isn’t strained
The fact that HackerOne triages everything really allowed us to move forward.
3. Budget readiness
If budget is a concern, start small:
- A private bounty program
- A small invite-only group of students
- A modest reward pool
1. Create an application and eligibility process
Ensure students:
- Are in good academic standing
- Understand ethical testing practices
- Are committed to learning
2. Implement guardrails and governance
Partner early with:
- Academic integrity offices
- Finance (to avoid conflict-of-interest concerns)
- IT leadership
- Legal/compliance
3. Start with a narrow scope
- Internet-accessible university assets
- Non-critical systems
- Faculty research environments with known visibility gaps
Address your IT team's concerns proactively before launch:
- Explain HackerOne’s triage and validation process
- Reinforce that teams receive verified findings, not raw noise
- Normalize that low- and medium-severity findings are expected
- Reframe findings as insight not failure
One of the big fears was that we’d be overloaded… but HackerOne triaging everything solved that.
SCU started with roughly a dozen student researchers.
Kristen's best practices:
- Keep the initial cohort small
- Provide onboarding and ethics training (Hacker101 modules, ethical hacking concepts)
- Hold an orientation workshop
- Set clear conduct and communication norms
- Celebrate participation and learning, not just valid findings
Students are incredibly resourceful and imaginative… they consider things we wouldn’t think about.
1.. Establish operating rhythms
- Weekly or biweekly reviews of triaged results
- Clear IT point-of-contact
- Defined remediation timelines
2. Track student growth and program impact
Kristen plans to measure:
- Student skill progression
- Quality of contributions
- Impact on job searches (time to first job)
- Whether findings reveal coverage gaps
3. Expect a slow start
Private programs often ramp slowly–and that’s normal. Activity increases as:
- Scope expands
- Students gain confidence
- Peer word-of-mouth spreads
Because students see what central IT cannot, SCU students surfaced:
- Research cloud accounts
- One-off departmental tools
- Third-party and outsourced applications
- Forgotten or legacy systems
This transformed SCU's program into a distributed visibility and assurance layer.
This mindset shift is key for institutional adoption. Kristen’s message to other universities: “Don’t be afraid of the results. If you get a lot of reports, that’s good—it helps you get better.”
Encourage stakeholders to see findings as progress. Use results to:
- Justify additional resources or staffing
- Strengthen governance
- Expand scope
- Demonstrate responsible risk management
For Jesuit institutions like SCU—and mission-driven universities in general—connect the program to:
- Ethical technology practice
- Service to the community
- Professional formation
- Responsible innovation
This elevates bug bounty from a security tactic to an educational asset.
Once the foundation is stable, universities can:
- Scale scope: Include more systems or cloud accounts.
- Grow the researcher pool: Invite more students, staff, or graduate researchers.
- Shift to continuous learning loops: Offer workshops, capture-the-flag tie-ins, industry guest speakers, internship pathways.
- Transition into public programs (if desired).