Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
1 of 15

How General Motors works with white hat hackers to enhance their security



Download to read offline

In 2017, General Motors produced over 17% of the cars and trucks sold in the U.S., each containing a host of high-tech mechanical, electronic, and communications systems. For example, the company has sold more than 8.6 million vehicles with 4G LTE connectivity built in, Cadillac’s Super Cruise is the only semi-autonomous driving system allowing drivers to completely remove their hands from the wheel, and they plan to have 20 electric models on the road by 2023.

The automaker began using hacker-powered security with a vulnerability disclosure policy (VDP) in early 2016. In the past two years, hackers working through GM’s VDP program have helped them identify and resolve more than 700 bugs.
To further elevate security to the highest levels of the company, GM recently created the role of Vice President of Global Cybersecurity, and merged all cybersecurity activity—both product and corporate—into one central organization.
“We’ve always approached security with a diverse set of tools in our toolbox,” said Jeff Massimilla, Vice President Global Cybersecurity at GM. “Hackers have become an essential part of our security ecosystem.”

Related Books

Free with a 30 day trial from Scribd

See all

How General Motors works with white hat hackers to enhance their security

  2. 2. GM Produces Some of the Most Advanced Cars and Trucks on the Road! Yeah, that’s some awesome tech! Customer Data PRODUCT TYPE LAUNCH DATE VULNERABILITIES RESOLVED COMPANY SIZE INDUSTRY PARTICIPATING HACKERS
  3. 3. GM is Reducing Risk with Industry- First Security Innovations
  4. 4.
  5. 5. GM, DoD, and Adobe HackerOne Response: The VDP Saas Platform DOWNLOAD THE FREE E-BOOK
  6. 6. GM Leverages the Speed of Hacker- Powered Security to Improve and Scale Security Capabilities
  7. 7. GM is Extending Security Efforts Up- and Downstream
  8. 8.
  9. 9. GM is Adding Bounties and Eliminating Barriers
  10. 10. DOWNLOAD THE FREE REPORT HackerOne Bounty: Infinitely Customizable Bug Bounty ● ● ● ●
  11. 11. GM Expands Their Red Team with Hackers
  12. 12.
  13. 13. GM is Committed to Hacker-Powered Security
  14. 14. GM is Committed to Hacker-Powered Security
  15. 15. About HackerOne CONTACT US