SlideShare a Scribd company logo
CUSTOMER EXPERIENCE PIONEER DIRECTLY PROTECTS
CUSTOMER DATA AND REPUTATION WITH BUGCROWD
Industry:
Technology
Bugcrowd Product:
Bug Bounty
SUMMARY
Challenge —
Maintain agility while securing the data
that powers the company’s AI-based
customer experience platform.
Solution —
Bugcrowd Bug Bounty
Outcomes —
•	 Improves Security Without
Impacting Agility
•	 Enables Faster Response to
Vulnerabilities
•	 Safeguards Reputation and
Customer Trust
A streamlined approach to crowd-
sourced security
From self-parking cars to smart personal assistants, AI is
changing the way we live. All AI systems rely on data as the
lifeblood that enables them to learn, but as it’s often of a
personal or sensitive nature, this data must be secure.
Customer experience pioneer Directly is transforming how
organizations deliver customer service by harnessing the power
of the crowd and best-in-class AI. The company’s platform
leverages machine learning and a community of thousands
of independent experts to answer and automate common
customer questions – delivering reliable and effective customer
service that consumers love.
By working with Directly, organizations are able to reduce
contact center volume up to 40%, improve customer satisfaction
ratings, and save millions of dollars per year.
To safeguard the sensitive customer data that powers its AI
platform, security is of paramount importance to Directly. The
company prides itself on its commitment to cybersecurity, with
protection against threats built into every facet of the business.
Bob Zinga, Director of Information Security at Directly, explains,
“Our business is built on trust. To achieve our goal of being the
leader in customer experience automation, our customers have
to know that their data is safe in our platform.”
As agile practices are key to Directly’s business development
strategies, it needed a security approach that would align with
their agile workflows and processes. “As a tech company, speed
is key to our competitive advantage,” adds Zinga. “We develop
code in two-week sprints as we have to be able to bring new
software capabilities to market very quickly.”
To maintain its dynamic culture while protecting customer information, the company has had a bug bounty program with
Bugcrowd since 2016. “A great vulnerability management program combines two key components: crowdsourced security
and quarterly penetration testing,” says Zinga. “The bug bounty program we have with Bugcrowd maps very well to our agile
development methodology. It’s the only way we can ensure all our new code is secure without causing delays.”
Via a streamlined process, researchers provide input on vulnerabilities discovered within Directly’s sandboxed environment,
and then the Bugcrowd team validates and triages their findings before passing them on to Directly’s engineers. Depending
on the impact of the potential vulnerability, Directly then either issues an emergency patch or includes the remediation in the
next sprint cycle.
“By working with
Bugcrowd, we’ve been
able to continuously
improve our security
metrics and maturity,
ensuring we maintain
customer trust in the
Directly platform, which
is vital for our reputation
and continued growth.
Bob Zinga
Director of Information Security at Directly
Keeping code secure without slowing innovation
More about the interviewee
From 2016 to 2020, Directly received more than 460 submissions from 447 researcher participants, which have helped the
company safeguard the security of its code without hampering agility. “The intel we receive from Bugcrowd is tremendous,”
says Zinga. “In the last year, we’ve been made aware of a couple of potential vulnerabilities and a bug that was due to the
misconfiguration of an online application. Armed with the right information, we were able to resolve any issues very quickly.”
The partnership with Bugcrowd has also helped justify portions
of the security budget at Directly. The Return On Investment
(ROI) has been significant as demonstrated by the validation and
mitigation of several high-level exploitable vulnerabilities brought
to light only by partnering with Bugcrowd. “Security has always
been a huge priority for Directly,” concludes Zinga. “By working
with Bugcrowd, we’ve been able to continuously improve our
security metrics and maturity, ensuring we maintain customer
trust in the Directly platform, which is vital for our reputation and
continued growth.”
To find out more about Directly and its pioneering approach to
customer support, go to www.directly.com.
For over two decades, Bob has worked in complex
environments at the intersection of people, processes and
technology. With an outstanding record of successfully
establishing globally recognized technology risk management
and cybersecurity programs, he has been setting the
vision, driving the strategy and governance framework,
establishing effective policies and standards, and managing
the cybersecurity risk and compliance functions within Higher
Education, State and Federal Governments, the Department of
Defense and Technology Industries.
Bob has been recognized within the information security
community for knowledge, vision, leadership and the
collaborative nature of effectively approaching a constantly
evolving and complex area of information security and risk
management. He has a proven ability to establish positive internal
and external C-level and boardroom relationships to effect
significant change and drive a cybersecurity risk management
strategy forward while enabling organization growth.
Bob is a firm believer in personal growth and development and
is dedicated to continuous growth in the areas of leadership,
goal setting, productivity and communication.
www.linkedin.com/in/bobfabienzinga
“With Bugcrowd, it’s been easy for us to implement, monitor and update our vulnerability management program. And as
they deduplicate and verify all the reported bugs, we’re free to focus on resolving them,” comments Zinga. “We have a very
collaborative relationship with regular meetings that help us constantly develop and improve, so we’re always getting the
most benefit from the program.”
Learn why hundreds of companies
have turned to Bugcrowd:
www.bugcrowd.com/get-started

More Related Content

What's hot

Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
Martin Finn
 
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o..."Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
Sairam Vedam
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
Moti Sagey מוטי שגיא
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Enterprise Mobile
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
Ping Identity
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
LinkedIn
 
Blockchain readiness block512
Blockchain readiness block512Blockchain readiness block512
Blockchain readiness block512
JoAnna Cheshire
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
rodrida1
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
BugRaptors
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
Wultra
 

What's hot (12)

Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o..."Software Quality, Reliability, Security and Resilience as the Corner stone o...
"Software Quality, Reliability, Security and Resilience as the Corner stone o...
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Blockchain readiness block512
Blockchain readiness block512Blockchain readiness block512
Blockchain readiness block512
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 

Similar to Customer experience pioneer directly protects customer data and reputation with bugcrowd

Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
Aggregage
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
kalichargn70th171
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
Insights success media and technology pvt ltd
 
Software Development
Software DevelopmentSoftware Development
Software Development
loviedigital
 
Thinkogic | Banking, Finance, Security & Insurance
Thinkogic | Banking, Finance, Security & InsuranceThinkogic | Banking, Finance, Security & Insurance
Thinkogic | Banking, Finance, Security & Insurance
Thinkogic
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
Conor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
Pablo Junco
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
NeetaSahay1
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case study
Symplified
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Felipe Prado
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
Pradeep Kumar
 
The Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdfThe Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdf
PIEDAP
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
CIO Look Magazine
 
Business Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital TransformationBusiness Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital Transformation
Cognizant
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
bugcrowd
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
CBIZ, Inc.
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
KaganMinare
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
Mighty Guides, Inc.
 

Similar to Customer experience pioneer directly protects customer data and reputation with bugcrowd (20)

Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Thinkogic | Banking, Finance, Security & Insurance
Thinkogic | Banking, Finance, Security & InsuranceThinkogic | Banking, Finance, Security & Insurance
Thinkogic | Banking, Finance, Security & Insurance
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case study
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
 
The Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdfThe Evolution of Digital Assurance - PIEDAP.pdf
The Evolution of Digital Assurance - PIEDAP.pdf
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Business Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital TransformationBusiness Assurance: The Quality Implications of Digital Transformation
Business Assurance: The Quality Implications of Digital Transformation
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Customer experience pioneer directly protects customer data and reputation with bugcrowd

  • 1. CUSTOMER EXPERIENCE PIONEER DIRECTLY PROTECTS CUSTOMER DATA AND REPUTATION WITH BUGCROWD Industry: Technology Bugcrowd Product: Bug Bounty SUMMARY Challenge — Maintain agility while securing the data that powers the company’s AI-based customer experience platform. Solution — Bugcrowd Bug Bounty Outcomes — • Improves Security Without Impacting Agility • Enables Faster Response to Vulnerabilities • Safeguards Reputation and Customer Trust A streamlined approach to crowd- sourced security From self-parking cars to smart personal assistants, AI is changing the way we live. All AI systems rely on data as the lifeblood that enables them to learn, but as it’s often of a personal or sensitive nature, this data must be secure. Customer experience pioneer Directly is transforming how organizations deliver customer service by harnessing the power of the crowd and best-in-class AI. The company’s platform leverages machine learning and a community of thousands of independent experts to answer and automate common customer questions – delivering reliable and effective customer service that consumers love. By working with Directly, organizations are able to reduce contact center volume up to 40%, improve customer satisfaction ratings, and save millions of dollars per year. To safeguard the sensitive customer data that powers its AI platform, security is of paramount importance to Directly. The company prides itself on its commitment to cybersecurity, with protection against threats built into every facet of the business. Bob Zinga, Director of Information Security at Directly, explains, “Our business is built on trust. To achieve our goal of being the leader in customer experience automation, our customers have to know that their data is safe in our platform.” As agile practices are key to Directly’s business development strategies, it needed a security approach that would align with their agile workflows and processes. “As a tech company, speed is key to our competitive advantage,” adds Zinga. “We develop code in two-week sprints as we have to be able to bring new software capabilities to market very quickly.” To maintain its dynamic culture while protecting customer information, the company has had a bug bounty program with Bugcrowd since 2016. “A great vulnerability management program combines two key components: crowdsourced security and quarterly penetration testing,” says Zinga. “The bug bounty program we have with Bugcrowd maps very well to our agile development methodology. It’s the only way we can ensure all our new code is secure without causing delays.” Via a streamlined process, researchers provide input on vulnerabilities discovered within Directly’s sandboxed environment, and then the Bugcrowd team validates and triages their findings before passing them on to Directly’s engineers. Depending on the impact of the potential vulnerability, Directly then either issues an emergency patch or includes the remediation in the next sprint cycle.
  • 2. “By working with Bugcrowd, we’ve been able to continuously improve our security metrics and maturity, ensuring we maintain customer trust in the Directly platform, which is vital for our reputation and continued growth. Bob Zinga Director of Information Security at Directly Keeping code secure without slowing innovation More about the interviewee From 2016 to 2020, Directly received more than 460 submissions from 447 researcher participants, which have helped the company safeguard the security of its code without hampering agility. “The intel we receive from Bugcrowd is tremendous,” says Zinga. “In the last year, we’ve been made aware of a couple of potential vulnerabilities and a bug that was due to the misconfiguration of an online application. Armed with the right information, we were able to resolve any issues very quickly.” The partnership with Bugcrowd has also helped justify portions of the security budget at Directly. The Return On Investment (ROI) has been significant as demonstrated by the validation and mitigation of several high-level exploitable vulnerabilities brought to light only by partnering with Bugcrowd. “Security has always been a huge priority for Directly,” concludes Zinga. “By working with Bugcrowd, we’ve been able to continuously improve our security metrics and maturity, ensuring we maintain customer trust in the Directly platform, which is vital for our reputation and continued growth.” To find out more about Directly and its pioneering approach to customer support, go to www.directly.com. For over two decades, Bob has worked in complex environments at the intersection of people, processes and technology. With an outstanding record of successfully establishing globally recognized technology risk management and cybersecurity programs, he has been setting the vision, driving the strategy and governance framework, establishing effective policies and standards, and managing the cybersecurity risk and compliance functions within Higher Education, State and Federal Governments, the Department of Defense and Technology Industries. Bob has been recognized within the information security community for knowledge, vision, leadership and the collaborative nature of effectively approaching a constantly evolving and complex area of information security and risk management. He has a proven ability to establish positive internal and external C-level and boardroom relationships to effect significant change and drive a cybersecurity risk management strategy forward while enabling organization growth. Bob is a firm believer in personal growth and development and is dedicated to continuous growth in the areas of leadership, goal setting, productivity and communication. www.linkedin.com/in/bobfabienzinga “With Bugcrowd, it’s been easy for us to implement, monitor and update our vulnerability management program. And as they deduplicate and verify all the reported bugs, we’re free to focus on resolving them,” comments Zinga. “We have a very collaborative relationship with regular meetings that help us constantly develop and improve, so we’re always getting the most benefit from the program.” Learn why hundreds of companies have turned to Bugcrowd: www.bugcrowd.com/get-started