How to Outsource Vulnerability Assessments to Hackers

Outsourcing certain cyber problems to the very individuals who are capable of exploiting them might be the most cost-effective way for an organization to protect its network. Hiring hackers can be a delicate process, however, and determining whether their intentions are good even more so. Crowdsourcing platforms can set up bug bounties for clients and provide various levels of screening and oversight to make sure these sorts of sensitive projects proceed smoothly. The Cybersecurity Law Report spoke to Lisa Wiswell, an advisor to San Francisco crowdsourcing platform, HackerOne, about using hackers in this way and about her experience leading the Hack the Pentagon project. See also “How to Establish and Manage a Successful Bug Bounty Program” (Mar. 22, 2017).

To read the full article

Continue reading your article with a CSLR subscription.