Are you curious about how to maximize the strategic value and impact of your bug bounty program?
In this episode, you can learn how Adobe continuously develops and improves its bounty program to engage security researchers and hackers globally and improve its security posture from an adversary perspective.
In this ISACA Podcast, Chris McGown, ISACA's Information Security Professional Practices Principal, chats with Alex Stan, Product Security Engineer and member of the Product Security Incident Response Team (PSIRT), discusses the value of bug bounty programs and shares how you can develop a metrics-driven approach to enhance the internal security testing and detection capabilities of your organization.
Explore Further: Delve deeper into the subject with additional resources
https://blog.developer.adobe.com/adobe-announces-researcher-hall-of-fame-initiative-for-security-researchers-5e677286dbd6
https://blog.developer.adobe.com/researcher-q-a-aem-solution-architect-by-day-adobe-bug-bounty-hunter-by-night-aed39a4750e4
https://blog.developer.adobe.com/attention-security-researchers-level-up-your-skills-and-join-our-private-bug-bounty-program-2da9d5979d8b
https://blog.developer.adobe.com/adobe-recap-2023-ambassador-world-cup-final-four-df701e1a1b12
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
Processes of Engagement with Scott Gould
Delivering Security Value to Product Teams Using the Power of Data
AI Ethics and the Role of IT Auditors
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
The True Cost of a Data Breach
2023 IT Compliance and Risk Benchmark Report
What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All
How Organizations Can Consistently Reduce Cyberrisk
Key Considerations for Conducting Remote IT Audits
Seven Things to Know Before Automating IT General Control Audits
Understanding, Assessing, Aligning and Transforming Organizational Culture
Topics in Emerging Technology, Governance and Ethics
Industry Spotlight - Julia Kanouse
What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World
The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative
Measuring Security Resilience from the Lens of the Adversary Community
Risky Business – Jon Brandt
Building Digital Trust Through Advocacy
Advertising Information Security
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast