SlideShare a Scribd company logo
1 of 2
Download to read offline
CUSTOMER EXPERIENCE PIONEER DIRECTLY PROTECTS
CUSTOMER DATA AND REPUTATION WITH BUGCROWD
Industry:
Technology
Bugcrowd Product:
Bug Bounty
SUMMARY
Challenge —
Maintain agility while securing the data
that powers the company’s AI-based
customer experience platform.
Solution —
Bugcrowd Bug Bounty
Outcomes —
•	 Improves Security Without
Impacting Agility
•	 Enables Faster Response to
Vulnerabilities
•	 Safeguards Reputation and
Customer Trust
A streamlined approach to crowd-
sourced security
From self-parking cars to smart personal assistants, AI is
changing the way we live. All AI systems rely on data as the
lifeblood that enables them to learn, but as it’s often of a
personal or sensitive nature, this data must be secure.
Customer experience pioneer Directly is transforming how
organizations deliver customer service by harnessing the power
of the crowd and best-in-class AI. The company’s platform
leverages machine learning and a community of thousands
of independent experts to answer and automate common
customer questions – delivering reliable and effective customer
service that consumers love.
By working with Directly, organizations are able to reduce
contact center volume up to 40%, improve customer satisfaction
ratings, and save millions of dollars per year.
To safeguard the sensitive customer data that powers its AI
platform, security is of paramount importance to Directly. The
company prides itself on its commitment to cybersecurity, with
protection against threats built into every facet of the business.
Bob Zinga, Director of Information Security at Directly, explains,
“Our business is built on trust. To achieve our goal of being the
leader in customer experience automation, our customers have
to know that their data is safe in our platform.”
As agile practices are key to Directly’s business development
strategies, it needed a security approach that would align with
their agile workflows and processes. “As a tech company, speed
is key to our competitive advantage,” adds Zinga. “We develop
code in two-week sprints as we have to be able to bring new
software capabilities to market very quickly.”
To maintain its dynamic culture while protecting customer information, the company has had a bug bounty program with
Bugcrowd since 2016. “A great vulnerability management program combines two key components: crowdsourced security
and quarterly penetration testing,” says Zinga. “The bug bounty program we have with Bugcrowd maps very well to our agile
development methodology. It’s the only way we can ensure all our new code is secure without causing delays.”
Via a streamlined process, researchers provide input on vulnerabilities discovered within Directly’s sandboxed environment,
and then the Bugcrowd team validates and triages their findings before passing them on to Directly’s engineers. Depending
on the impact of the potential vulnerability, Directly then either issues an emergency patch or includes the remediation in the
next sprint cycle.
“By working with
Bugcrowd, we’ve been
able to continuously
improve our security
metrics and maturity,
ensuring we maintain
customer trust in the
Directly platform, which
is vital for our reputation
and continued growth.
Bob Zinga
Director of Information Security at Directly
Keeping code secure without slowing innovation
More about the interviewee
From 2016 to 2020, Directly received more than 460 submissions from 447 researcher participants, which have helped the
company safeguard the security of its code without hampering agility. “The intel we receive from Bugcrowd is tremendous,”
says Zinga. “In the last year, we’ve been made aware of a couple of potential vulnerabilities and a bug that was due to the
misconfiguration of an online application. Armed with the right information, we were able to resolve any issues very quickly.”
The partnership with Bugcrowd has also helped justify portions
of the security budget at Directly. The Return On Investment
(ROI) has been significant as demonstrated by the validation and
mitigation of several high-level exploitable vulnerabilities brought
to light only by partnering with Bugcrowd. “Security has always
been a huge priority for Directly,” concludes Zinga. “By working
with Bugcrowd, we’ve been able to continuously improve our
security metrics and maturity, ensuring we maintain customer
trust in the Directly platform, which is vital for our reputation and
continued growth.”
To find out more about Directly and its pioneering approach to
customer support, go to www.directly.com.
For over two decades, Bob has worked in complex
environments at the intersection of people, processes and
technology. With an outstanding record of successfully
establishing globally recognized technology risk management
and cybersecurity programs, he has been setting the
vision, driving the strategy and governance framework,
establishing effective policies and standards, and managing
the cybersecurity risk and compliance functions within Higher
Education, State and Federal Governments, the Department of
Defense and Technology Industries.
Bob has been recognized within the information security
community for knowledge, vision, leadership and the
collaborative nature of effectively approaching a constantly
evolving and complex area of information security and risk
management. He has a proven ability to establish positive internal
and external C-level and boardroom relationships to effect
significant change and drive a cybersecurity risk management
strategy forward while enabling organization growth.
Bob is a firm believer in personal growth and development and
is dedicated to continuous growth in the areas of leadership,
goal setting, productivity and communication.
www.linkedin.com/in/bobfabienzinga
“With Bugcrowd, it’s been easy for us to implement, monitor and update our vulnerability management program. And as
they deduplicate and verify all the reported bugs, we’re free to focus on resolving them,” comments Zinga. “We have a very
collaborative relationship with regular meetings that help us constantly develop and improve, so we’re always getting the
most benefit from the program.”
Learn why hundreds of companies
have turned to Bugcrowd:
www.bugcrowd.com/get-started

More Related Content

What's hot

Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Martin Finn
 
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o..."Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o...Sairam Vedam
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthPing Identity
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
Blockchain readiness block512
Blockchain readiness block512Blockchain readiness block512
Blockchain readiness block512JoAnna Cheshire
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsBugRaptors
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 

What's hot (12)

Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o..."Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Blockchain readiness block512
Blockchain readiness block512Blockchain readiness block512
Blockchain readiness block512
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 

Similar to Customer experience pioneer directly protects customer data and reputation with bugcrowd

Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...kalichargn70th171
 
Software Development
Software DevelopmentSoftware Development
Software Developmentloviedigital
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case studySymplified
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
The Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdfThe Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdfPIEDAP
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Business Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital TransformationBusiness Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital TransformationCognizant
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTEDbugcrowd
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional BrochureKaganMinare
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 

Similar to Customer experience pioneer directly protects customer data and reputation with bugcrowd (20)

Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case study
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
 
The Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdfThe Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdf
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Business Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital TransformationBusiness Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital Transformation
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Customer experience pioneer directly protects customer data and reputation with bugcrowd

  • 1. CUSTOMER EXPERIENCE PIONEER DIRECTLY PROTECTS CUSTOMER DATA AND REPUTATION WITH BUGCROWD Industry: Technology Bugcrowd Product: Bug Bounty SUMMARY Challenge — Maintain agility while securing the data that powers the company’s AI-based customer experience platform. Solution — Bugcrowd Bug Bounty Outcomes — • Improves Security Without Impacting Agility • Enables Faster Response to Vulnerabilities • Safeguards Reputation and Customer Trust A streamlined approach to crowd- sourced security From self-parking cars to smart personal assistants, AI is changing the way we live. All AI systems rely on data as the lifeblood that enables them to learn, but as it’s often of a personal or sensitive nature, this data must be secure. Customer experience pioneer Directly is transforming how organizations deliver customer service by harnessing the power of the crowd and best-in-class AI. The company’s platform leverages machine learning and a community of thousands of independent experts to answer and automate common customer questions – delivering reliable and effective customer service that consumers love. By working with Directly, organizations are able to reduce contact center volume up to 40%, improve customer satisfaction ratings, and save millions of dollars per year. To safeguard the sensitive customer data that powers its AI platform, security is of paramount importance to Directly. The company prides itself on its commitment to cybersecurity, with protection against threats built into every facet of the business. Bob Zinga, Director of Information Security at Directly, explains, “Our business is built on trust. To achieve our goal of being the leader in customer experience automation, our customers have to know that their data is safe in our platform.” As agile practices are key to Directly’s business development strategies, it needed a security approach that would align with their agile workflows and processes. “As a tech company, speed is key to our competitive advantage,” adds Zinga. “We develop code in two-week sprints as we have to be able to bring new software capabilities to market very quickly.” To maintain its dynamic culture while protecting customer information, the company has had a bug bounty program with Bugcrowd since 2016. “A great vulnerability management program combines two key components: crowdsourced security and quarterly penetration testing,” says Zinga. “The bug bounty program we have with Bugcrowd maps very well to our agile development methodology. It’s the only way we can ensure all our new code is secure without causing delays.” Via a streamlined process, researchers provide input on vulnerabilities discovered within Directly’s sandboxed environment, and then the Bugcrowd team validates and triages their findings before passing them on to Directly’s engineers. Depending on the impact of the potential vulnerability, Directly then either issues an emergency patch or includes the remediation in the next sprint cycle.
  • 2. “By working with Bugcrowd, we’ve been able to continuously improve our security metrics and maturity, ensuring we maintain customer trust in the Directly platform, which is vital for our reputation and continued growth. Bob Zinga Director of Information Security at Directly Keeping code secure without slowing innovation More about the interviewee From 2016 to 2020, Directly received more than 460 submissions from 447 researcher participants, which have helped the company safeguard the security of its code without hampering agility. “The intel we receive from Bugcrowd is tremendous,” says Zinga. “In the last year, we’ve been made aware of a couple of potential vulnerabilities and a bug that was due to the misconfiguration of an online application. Armed with the right information, we were able to resolve any issues very quickly.” The partnership with Bugcrowd has also helped justify portions of the security budget at Directly. The Return On Investment (ROI) has been significant as demonstrated by the validation and mitigation of several high-level exploitable vulnerabilities brought to light only by partnering with Bugcrowd. “Security has always been a huge priority for Directly,” concludes Zinga. “By working with Bugcrowd, we’ve been able to continuously improve our security metrics and maturity, ensuring we maintain customer trust in the Directly platform, which is vital for our reputation and continued growth.” To find out more about Directly and its pioneering approach to customer support, go to www.directly.com. For over two decades, Bob has worked in complex environments at the intersection of people, processes and technology. With an outstanding record of successfully establishing globally recognized technology risk management and cybersecurity programs, he has been setting the vision, driving the strategy and governance framework, establishing effective policies and standards, and managing the cybersecurity risk and compliance functions within Higher Education, State and Federal Governments, the Department of Defense and Technology Industries. Bob has been recognized within the information security community for knowledge, vision, leadership and the collaborative nature of effectively approaching a constantly evolving and complex area of information security and risk management. He has a proven ability to establish positive internal and external C-level and boardroom relationships to effect significant change and drive a cybersecurity risk management strategy forward while enabling organization growth. Bob is a firm believer in personal growth and development and is dedicated to continuous growth in the areas of leadership, goal setting, productivity and communication. www.linkedin.com/in/bobfabienzinga “With Bugcrowd, it’s been easy for us to implement, monitor and update our vulnerability management program. And as they deduplicate and verify all the reported bugs, we’re free to focus on resolving them,” comments Zinga. “We have a very collaborative relationship with regular meetings that help us constantly develop and improve, so we’re always getting the most benefit from the program.” Learn why hundreds of companies have turned to Bugcrowd: www.bugcrowd.com/get-started