Skip to main content

Security@ 2022: Achieve Attack Resistance

Get your complimentary pass to Security@ 2022 with promo code VIPCOMP

October 12-13, San Diego | October 13, London

Register today

 

Top CISOs ARM their teams with HackerOne

Attack Resistance Management helps CISOs stay ahead of threats with ethical hackers to catch vulnerabilities scans miss.

See What People are Saying

Jeff Massimilla
Vice President Global Cybersecurity at GM

We value the expertise of the security research community, and have been very pleased with the program’s performance to date. Researchers are engaged, and the quality of information we’re receiving is extremely valuable and is helping us improve security across all areas of GM.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Dr. Jasyn Voshell
Director of Product Security at Zebra Technologies

Working with HackerOne, we have had a solid return on investment while reducing risk. Zebra has scaled our security program across the different product offerings within HackerOne from security assessments for product releases, bug bounty for continuous testing, and a mechanism for third-party security researchers to submit vulnerabilities.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Pete Yaworski
Senior Application Security Engineer

Security is not a one-time thing, but a continuous cycle. We know that there are always going to be bugs in software development. As we develop, and as we iterate, we want to make sure security is an active part of that process, and never a roadblock to innovation. The HackerOne bug bounty program allows us to put another cog in the wheel of security.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Benjamin Vaughn
CISO, Hyatt

We believe there is immense value in having a bug bounty program as part of our cybersecurity strategy, and we encourage all companies, not just those in the hospitality industry, to take a similar approach and consider bug bounty as a proactive security initiative.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Vinayendra Nataraja
Senior Product Security Engineer

The program has been successful because of the continued contributions from diverse, talented researchers, security engineers who triage and guide teams to remediate, and our engineering team that is always enthusiastic to learn from these bugs.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Pax Whitmore
Security Engineer, PayPal

In addition to some amazing, creative submissions, we’ve received some incredible feedback from researchers. In just a few short months, we’ve used that feedback to make substantial changes to our scope, payments, and transparency. We want hackers to challenge and educate us, and build a trusting and respectful relationship that goes both ways.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Chris Lynch
Director, DDS, U.S. Department of Defense

We know for a fact that sending a wide variety of hackers into a wide environment will result in something meaningful. It is a fact. We cannot hire every amazing hacker and have them come work for us, but we can do these crowdsourced bug bounties. I’m done with being afraid to know what our vulnerabilities are. That’s not okay.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Justin Berman
Head of Security, Dropbox

We have an industry-leading vulnerability disclosure program that protects ethical researchers and partnered with HackerOne to include sensitive vendors in the scope of our bug bounty program to help protect our entire ecosystem. Our hope is that bug bounty programs like ours continue to spearhead a culture of collaboration and transparency that benefits cybersecurity as a whole.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
Matthew Southworth
CISO, Priceline

We partnered with HackerOne because their triage is impressive. HackerOne handles contact with researchers and validates their findings. This allows us to focus our energies on addressing vulnerabilities.

add_circle_outlinedRead Testimonial
remove_circle_outlinedHide Testimonial
east
west