1 00:00:08,900 --> 00:00:14,760 Now, let us see what is Hecho power security in the last lecture we saw. 2 00:00:14,870 --> 00:00:17,360 Why do we need to fix one liberties? 3 00:00:19,050 --> 00:00:24,360 So before we dive into bug bounty program, let's define hack up our security. 4 00:00:25,640 --> 00:00:32,690 Hack up our security is any technique that utilizes the external hacker community to find an unknown 5 00:00:32,780 --> 00:00:40,250 security vulnerabilities and reduce the cyber risk, which means suppose Amazon is hiring an external 6 00:00:40,250 --> 00:00:41,890 hacker or a freelance hacker. 7 00:00:42,110 --> 00:00:46,790 And this tell him that please find out when the liberties from X, Y, Z program. 8 00:00:47,160 --> 00:00:50,140 And that is an example of hack up our security. 9 00:00:50,420 --> 00:00:56,720 You don't need your employees to actually work on that, but you need to hire an external hacker who 10 00:00:56,720 --> 00:01:01,370 can work for you to finding vulnerabilities, not common. 11 00:01:01,370 --> 00:01:07,460 Examples include bug bounty programs, hacker power tests and vulnerability disclosure policies. 12 00:01:08,170 --> 00:01:12,040 Don't worry, we are going to look at all these terms in our next lecture. 13 00:01:13,490 --> 00:01:20,540 They'll hack up our security arms organizations with the skills, experience and non-stop coverage of 14 00:01:20,540 --> 00:01:29,210 creative and experienced hackers and researchers, these finders work to identify vulnerabilities before 15 00:01:29,210 --> 00:01:31,310 they can be exploited by criminals. 16 00:01:32,210 --> 00:01:40,490 Now it's fast structured and proven model for crowdsourcing the right expertise, applying it when and 17 00:01:40,490 --> 00:01:41,350 where you need. 18 00:01:42,620 --> 00:01:48,560 Also, these bug bounty hackers or external hackers get paid after the result. 19 00:01:48,560 --> 00:01:49,500 A successful one. 20 00:01:51,110 --> 00:01:58,970 Think of Hagop, our security as an extension of in your house security team, but nearly limitless 21 00:01:58,970 --> 00:02:02,720 capabilities and elastic on demand usage model. 22 00:02:03,980 --> 00:02:11,200 Bug bounty programs offer continuous testing to secure applications that power your organization. 23 00:02:12,590 --> 00:02:19,400 We know that state sponsored actors and black hat hackers want to challenge and exploit our networks. 24 00:02:19,820 --> 00:02:20,810 We know that, right? 25 00:02:21,260 --> 00:02:28,790 What we did not fully appreciate before this pilot was how many white hat hackers there are who want 26 00:02:28,790 --> 00:02:33,940 to make a difference, who want to help keep our people and our nation safer. 27 00:02:34,430 --> 00:02:38,600 Now, all these terms allow you to attack a gray haired hacker that had hacker. 28 00:02:38,870 --> 00:02:43,270 We all are going to see these terms in our upcoming video lectures. 29 00:02:43,640 --> 00:02:47,510 So if you have any doubt, please feel free to ask us the question. 30 00:03:05,030 --> 00:03:11,470 In the next lecture, we will see what are the important terms required for this bug bounty program.