Human Vs Machine: Human With Machine Hacking Remote Who Will Win The Fight of Automation?

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

HUMAN VS MACHINE

@randomdeduction
-HACKER

Veracode and HackerOne are partnering together to discuss how the


powerful combination of human and machine takes security to the next level
in this three-part series.

PA R T 1 PA R T 2 PA R T 3

HUMAN WITH HACKING REMOTE WHO WILL WIN


MACHINE THE FIGHT OF
AUTOMATION?
Adapting your security Leveraging automation and Augmenting your existing
development lifecycle for devops crowdsourced testing to secure approaches with human insight
your enterprise
View On-Demand View On-Demand View On-Demand

As companies work overtime to push code, criminals work overtime to find


ways to break it, and it can often feel impossible to scale security with product
development. Innovation is outpacing traditional security measures, and it will take
a unique combination of human and machine for security to keep pace.

1 HUMAN VS MACHINE
YOUR SPEAKERS & MODERATORS

2 HUMAN VS MACHINE
Tech executives from HackerOne and Veracode will discuss how development
PA R T 1
and security teams can combine automation and human talent to provide
HUMAN WITH security at the speed of innovation.
MACHINE Speakers: Alex Rice and Chris Wysopal
Moderated by: Chris Kirsch
ADAPTING YOUR SECURITY
DEVELOPMENT LIFECYCLE KEY TAKEAWAYS
FOR DEVOPS
1. How security and development teams can partner to create a continuous
VIEW ON-DEMAND feedback loop without hampering innovation

2. How security becomes a competitive advantage through balancing speed


with risk

3. How to engage a diverse and creative pool of talent not available in


traditional firms to test business critical applications

In this talk, product leaders will discuss the undue strain put on security teams,
PA R T 2
and delve into how leveraging automation and crowdsourced security allows
HACKING REMOTE enterprises to scale and accommodate a newly dispersed workforce.
Speakers: Miju Han and Brittany O’Shea
LEVERAGING AUTOMATION AND
Moderated by: April Rassa
CROWDSOURCED TESTING TO
SECURE YOUR ENTERPRISE
KEY TAKEAWAYS

VIEW ON-DEMAND 1. How to implement a security program with the scale necessary to cover a
growing attack surface

2. How to operate security at scale while reducing costs and removing the
need for expensive headcount

3. Trends and insights into the vulnerabilities impacting companies during a


time of increased digital connectivity

Security experts from Veracode and HackerOne will debate the unique values
PA R T 3
human and machine bring, and will discuss why companies need a complete
WHO WILL WIN security strategy that takes into account the strengths technology can provide
THE FIGHT OF coupled with the need for creativity and adaptability that only humans can bring.
Speakers: Johnny Nipper and Tanner Emek
AUTOMATION? Moderated by: Ryan O’Boyle
AUGMENTING YOUR EXISTING
APPROACHES WITH HUMAN INSIGHT KEY TAKEAWAYS

1. Differences in vulnerabilities found by hackers vs. automated tools


VIEW ON-DEMAND
2. Suggestions for augmenting existing security best practices with a human touch

3. When to choose between automation and human-powered security for


your organizationtime of increased digital connectivity

3 HUMAN VS MACHINE

You might also like