SlideShare a Scribd company logo
1 of 15
Securing the web with the crowd 
Esben Friis-Jensen, CrowdCurity 
CrowdCurity
2 
Businesses are losing the battle! 
CrowdCurity
Existing solutions fail! 
CrowdCurity 
IT security consultants 
Expensive 
Non-scaleable 
CrowdCurity
The Solution is here 
Crowdsourced Web Security 
"99designs meets IT 
security" 
CrowdCurity
How it works 
CrowdCurity 
Business Testers 
Bug Reports 
Bounty 
CrowdCurity 
Bug bounty 
program
Friendly hackers 
CrowdCurity
Mature model 
CrowdCurity
• Founded in July 2013 
• Platform launched in Sept. 2013 
• Based in San Francisco 
• 4 Danish founders 
CrowdCurity
Crowdsourced security made simple 
CrowdCu 
Business Testers 
rity 
Bug Reports 
Bounty 
CrowdCurity
Building trust and quality 
CrowdCurity
1500+ Security Testers 
CrowdCurity
130+ Businesses 
CrowdCurity
Don’t wait for the bad guys! 
CrowdCurity
? 
CrowdCurity
www.crowdcurity.com 
CrowdCurity

More Related Content

What's hot

Security confessions of a small country
Security confessions of a small countrySecurity confessions of a small country
Security confessions of a small countryLaura Bell
 
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps»  GO DevOpsІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps»  GO DevOps
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOpsUA DevOps Conference
 
Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)Thomas Vitale
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Thomas Vitale
 
Security is a process, not a plugin (WordCamp London 2018)
Security is a process, not a plugin  (WordCamp London 2018)Security is a process, not a plugin  (WordCamp London 2018)
Security is a process, not a plugin (WordCamp London 2018)Thomas Vitale
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?Amazon Web Services
 
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFSSecure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFSIsabelle Dumont
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015Wynyard Group
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityDinis Cruz
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsNetLockSmith
 
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015Mario Andrade
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
How Google Protects your Data
How Google Protects your DataHow Google Protects your Data
How Google Protects your DataThomas Igou
 
Integrated Cyber Conferece
Integrated Cyber ConfereceIntegrated Cyber Conferece
Integrated Cyber ConfereceWende Peters
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz
 
Seach Engine: Case Study
Seach Engine: Case StudySeach Engine: Case Study
Seach Engine: Case StudyAndre
 

What's hot (20)

Security confessions of a small country
Security confessions of a small countrySecurity confessions of a small country
Security confessions of a small country
 
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps»  GO DevOpsІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps»  GO DevOps
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
 
Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)
 
Security is a process, not a plugin (WordCamp London 2018)
Security is a process, not a plugin  (WordCamp London 2018)Security is a process, not a plugin  (WordCamp London 2018)
Security is a process, not a plugin (WordCamp London 2018)
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?
 
Predrag cv short english
Predrag cv short englishPredrag cv short english
Predrag cv short english
 
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFSSecure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
Secure your Hadoop clusters with BlueTalon SecureAccess for WebHDFS
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
Cost of Cyber Crime UK Data
Cost of Cyber Crime UK DataCost of Cyber Crime UK Data
Cost of Cyber Crime UK Data
 
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015
Extra! Extra! Rethinking the Guardian breaking news experience - EuroIA 2015
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
How Google Protects your Data
How Google Protects your DataHow Google Protects your Data
How Google Protects your Data
 
Michael Davis Bio
Michael Davis BioMichael Davis Bio
Michael Davis Bio
 
Integrated Cyber Conferece
Integrated Cyber ConfereceIntegrated Cyber Conferece
Integrated Cyber Conferece
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
 
Seach Engine: Case Study
Seach Engine: Case StudySeach Engine: Case Study
Seach Engine: Case Study
 

Similar to Securing the Web with the Crowd

Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Alex Yates
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
Innovation and Architecture
Innovation and ArchitectureInnovation and Architecture
Innovation and ArchitectureAdrian Cockcroft
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxCNSHacking
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?Lori McInnes
 

Similar to Securing the Web with the Crowd (20)

Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Innovation and Architecture
Innovation and ArchitectureInnovation and Architecture
Innovation and Architecture
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
16231
1623116231
16231
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Evolving Cybersecurity Threats
Evolving Cybersecurity Threats  Evolving Cybersecurity Threats
Evolving Cybersecurity Threats
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 

More from Crowdsourcing Week

Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing Week
 
Transforming the Global Payments Operation
Transforming the Global Payments OperationTransforming the Global Payments Operation
Transforming the Global Payments OperationCrowdsourcing Week
 
Crowdsourced to Outsourced: How online platforms are shaping the future of work
Crowdsourced to Outsourced: How online platforms are shaping the future of workCrowdsourced to Outsourced: How online platforms are shaping the future of work
Crowdsourced to Outsourced: How online platforms are shaping the future of workCrowdsourcing Week
 
Malasya's Experience in Crowd Labour and Sharing Economy
Malasya's Experience in Crowd Labour and Sharing EconomyMalasya's Experience in Crowd Labour and Sharing Economy
Malasya's Experience in Crowd Labour and Sharing EconomyCrowdsourcing Week
 
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...Crowdsourcing Week
 
Human Collective Intelligence: the future of corporate innovation
Human Collective Intelligence: the future of corporate innovationHuman Collective Intelligence: the future of corporate innovation
Human Collective Intelligence: the future of corporate innovationCrowdsourcing Week
 
9 Ways to Ruin Your Open Innovation Challenge
9 Ways to Ruin Your Open Innovation Challenge9 Ways to Ruin Your Open Innovation Challenge
9 Ways to Ruin Your Open Innovation ChallengeCrowdsourcing Week
 
Accelerating Hardware Development: Ideation and Engineering
Accelerating Hardware Development: Ideation and EngineeringAccelerating Hardware Development: Ideation and Engineering
Accelerating Hardware Development: Ideation and EngineeringCrowdsourcing Week
 
Attracting and Retaining Top Partners with a Best-in-Class Payments Experience
Attracting and Retaining Top Partners with a Best-in-Class Payments ExperienceAttracting and Retaining Top Partners with a Best-in-Class Payments Experience
Attracting and Retaining Top Partners with a Best-in-Class Payments ExperienceCrowdsourcing Week
 
Core + Crowd: Why (and how) crowdsourcing is about to become mainstream
Core + Crowd: Why (and how) crowdsourcing is about to become mainstreamCore + Crowd: Why (and how) crowdsourcing is about to become mainstream
Core + Crowd: Why (and how) crowdsourcing is about to become mainstreamCrowdsourcing Week
 
Smart and Secure Cities and Communities
Smart and Secure Cities and Communities Smart and Secure Cities and Communities
Smart and Secure Cities and Communities Crowdsourcing Week
 
How Successful Crowdsourcing Depends on asking 'Interesting Questions'
How Successful Crowdsourcing Depends on asking 'Interesting Questions'How Successful Crowdsourcing Depends on asking 'Interesting Questions'
How Successful Crowdsourcing Depends on asking 'Interesting Questions'Crowdsourcing Week
 
Contestant Centered Design: creative approaches to designing competitions
Contestant Centered Design: creative approaches to designing competitionsContestant Centered Design: creative approaches to designing competitions
Contestant Centered Design: creative approaches to designing competitionsCrowdsourcing Week
 
How Crypto can Monetize Crowdsourcing
How Crypto can Monetize CrowdsourcingHow Crypto can Monetize Crowdsourcing
How Crypto can Monetize CrowdsourcingCrowdsourcing Week
 
A New Report on the State of Open Innovation and What it Means For you
A New Report on the State of Open Innovation and What it Means For youA New Report on the State of Open Innovation and What it Means For you
A New Report on the State of Open Innovation and What it Means For youCrowdsourcing Week
 
Expert Operating System: Business On-Demand
Expert Operating System: Business On-DemandExpert Operating System: Business On-Demand
Expert Operating System: Business On-DemandCrowdsourcing Week
 
Crowdsourcing: Changing the Faces of Innovation at NASA
Crowdsourcing: Changing the Faces of Innovation at NASACrowdsourcing: Changing the Faces of Innovation at NASA
Crowdsourcing: Changing the Faces of Innovation at NASACrowdsourcing Week
 
Crowdfunding an ICO Without Getting In Trouble
Crowdfunding an ICO Without Getting In TroubleCrowdfunding an ICO Without Getting In Trouble
Crowdfunding an ICO Without Getting In TroubleCrowdsourcing Week
 

More from Crowdsourcing Week (20)

Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
 
Transforming the Global Payments Operation
Transforming the Global Payments OperationTransforming the Global Payments Operation
Transforming the Global Payments Operation
 
Crowdsourced to Outsourced: How online platforms are shaping the future of work
Crowdsourced to Outsourced: How online platforms are shaping the future of workCrowdsourced to Outsourced: How online platforms are shaping the future of work
Crowdsourced to Outsourced: How online platforms are shaping the future of work
 
Malasya's Experience in Crowd Labour and Sharing Economy
Malasya's Experience in Crowd Labour and Sharing EconomyMalasya's Experience in Crowd Labour and Sharing Economy
Malasya's Experience in Crowd Labour and Sharing Economy
 
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...
LM Industries: Harnessing The Power of Crowdsourced Innovation to Build the F...
 
Human Collective Intelligence: the future of corporate innovation
Human Collective Intelligence: the future of corporate innovationHuman Collective Intelligence: the future of corporate innovation
Human Collective Intelligence: the future of corporate innovation
 
9 Ways to Ruin Your Open Innovation Challenge
9 Ways to Ruin Your Open Innovation Challenge9 Ways to Ruin Your Open Innovation Challenge
9 Ways to Ruin Your Open Innovation Challenge
 
Disruptive Crowdsourcing
Disruptive CrowdsourcingDisruptive Crowdsourcing
Disruptive Crowdsourcing
 
Accelerating Hardware Development: Ideation and Engineering
Accelerating Hardware Development: Ideation and EngineeringAccelerating Hardware Development: Ideation and Engineering
Accelerating Hardware Development: Ideation and Engineering
 
Attracting and Retaining Top Partners with a Best-in-Class Payments Experience
Attracting and Retaining Top Partners with a Best-in-Class Payments ExperienceAttracting and Retaining Top Partners with a Best-in-Class Payments Experience
Attracting and Retaining Top Partners with a Best-in-Class Payments Experience
 
Crowdsourcing Disaster Relief
Crowdsourcing Disaster ReliefCrowdsourcing Disaster Relief
Crowdsourcing Disaster Relief
 
Core + Crowd: Why (and how) crowdsourcing is about to become mainstream
Core + Crowd: Why (and how) crowdsourcing is about to become mainstreamCore + Crowd: Why (and how) crowdsourcing is about to become mainstream
Core + Crowd: Why (and how) crowdsourcing is about to become mainstream
 
Smart and Secure Cities and Communities
Smart and Secure Cities and Communities Smart and Secure Cities and Communities
Smart and Secure Cities and Communities
 
How Successful Crowdsourcing Depends on asking 'Interesting Questions'
How Successful Crowdsourcing Depends on asking 'Interesting Questions'How Successful Crowdsourcing Depends on asking 'Interesting Questions'
How Successful Crowdsourcing Depends on asking 'Interesting Questions'
 
Contestant Centered Design: creative approaches to designing competitions
Contestant Centered Design: creative approaches to designing competitionsContestant Centered Design: creative approaches to designing competitions
Contestant Centered Design: creative approaches to designing competitions
 
How Crypto can Monetize Crowdsourcing
How Crypto can Monetize CrowdsourcingHow Crypto can Monetize Crowdsourcing
How Crypto can Monetize Crowdsourcing
 
A New Report on the State of Open Innovation and What it Means For you
A New Report on the State of Open Innovation and What it Means For youA New Report on the State of Open Innovation and What it Means For you
A New Report on the State of Open Innovation and What it Means For you
 
Expert Operating System: Business On-Demand
Expert Operating System: Business On-DemandExpert Operating System: Business On-Demand
Expert Operating System: Business On-Demand
 
Crowdsourcing: Changing the Faces of Innovation at NASA
Crowdsourcing: Changing the Faces of Innovation at NASACrowdsourcing: Changing the Faces of Innovation at NASA
Crowdsourcing: Changing the Faces of Innovation at NASA
 
Crowdfunding an ICO Without Getting In Trouble
Crowdfunding an ICO Without Getting In TroubleCrowdfunding an ICO Without Getting In Trouble
Crowdfunding an ICO Without Getting In Trouble
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Securing the Web with the Crowd

Editor's Notes

  1. Jacob – CEO CrowdCurity, we do crowdsourced web security I’m going present how you can avoid getting hacked