Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

Truth in IT
05/05/2025
54
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. There's 25,000 people here. We hear lots of people going on at the show. Lots of themes from, uh, vulnerability to new features to AI that were going on here. But we are here right now standing with HackerOne . I've got Paul. Paul, welcome. Hey, thank you very much. Nice to be here. Uh, let's talk about HackerOne, then. Just because we're here, uh, you guys are, uh, kind of a leader in security. Tell us a little bit about what that means and what more specifically you do. Yeah, absolutely. So we absolutely are a leader in security. Uh, we have the largest community of ethical hackers, about 2.1 million and counting. And what we do is we utilize this amazing skill set that we have in this diverse bench of ethical hackers to actively hack on assets and find vulnerabilities before the bad guys do. Uh, so we're most known for our bug bounty program, and we're actually the leader in that space. All right. Are people motivated to do this just out of the kindness of their hearts? Are they? I mean, you mentioned a bounty. Or is this something that people find as a challenge mentally? What's going on with that? That hacker mindset? It is a challenge mentally, but mainly organizations are coming to us because they're terrified that they're going to suffer a breach, right. And in some instances they have suffered a breach. So we can use this ethical hacking community to find those vulnerabilities before the bad guys do. The ethical hackers that participate on our platform actually receive a bounty or a small payment for finding that? And it gives them a chance to form a really great relationship with that, with that community and the organization as well. We do have an offering as well, VDP Vulnerability Disclosure Program. It's a see something, say something program. So in that instance, we just want to be the mechanism for ethical researchers to be able to report to organizations. They don't get paid for that, but they can still get really, really great findings from the from the environment. All right. We're looking around at this show with all these people coming by and everything. How are you recruiting here? Are you trying to generate interest? What goes on here for you guys? A little bit of a a little bit of b yeah. So we've had some of our ethical research community come by. Our hackers, if you will. Um, sometimes they want to just hear about our developments, our advancements. You know, what else can the platform do for them? You know, a lot of them earn a really great living on the platform. We've also had organizations, current customers and prospects come by wanting to know what's new at HackerOne . You know, how can you help me with my AI chatbot? You know, I'm terrified of being breached. So it's really great to see the excitement here. And so far, the engagement's been really, really great at the booth. Yeah. Speaking of sort of the trends, AI is obviously a big trend here in adoption. So how is that affecting your community? Are you seeing more people using AI in ethically, unethically or more people using AI for good? How is that working out? Well, on our side, we're absolutely seeing people use AI for good, right? And hacker wants no stranger to that either. We've developed an internal AI chatbot named High High for HackerOne AI that's for our organizations, and it can help automate a lot of the typically manual processes in the platform. And we really want to make the the different offerings that we have as easy as possible for the organizations to consume. So HackerOne is proactively using AI to provide benefit to the organizations that are using us. We are also seeing ethical researchers build their own tools to do things like discover vulnerabilities. And obviously AI is just a huge tool for that as well. So it's it's happening on both sides of the table. Really good race. If you wanted to get one message out to everyone here at the show, sort of and say, like, if you had the big microphone, what would you tell them? I would tell them to come by the HackerOne booth, talk to our wonderful team up front, grab a cup of coffee, come back here and see a demo, and learn more about what ethical hacking can do for you. And we can talk you through all of these programs, and we can help you figure out how to make your environment much, much safer. All right. Well, thank you so much, Paul. Thank you for talking to us today. Appreciate it. Thank you so much. All right. Check it out. And what's the website again? HackerOne .com. HackerOne .com. Take care.
HackerOne taps into a 2.1 million-strong army of security researchers to identify vulnerabilities before bad actors strike. They lead the bug bounty world and also run VDP programs for zero-pay disclosures. AI is both a tool and a threat, and HackerOne embraces both sides with their internal HackerOne AI security agent, Hai. Real hackers. Real results. Real caffeine.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • hackerone
  • bug
  • bounty
  • ethical
  • hacking
  • vdp
  • crowdsourced
  • security
  • penetration
  • testing
  • ai
  • threats
  • responsible
  • disclosure
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

              Upcoming Webinar Calendar

              • 02/19/2026
                10:00 AM
                02/19/2026
                Future-proofing Your Resilience Strategy for Tomorrow's Challenges
                https://www.truthinit.com/index.php/channel/1816/future-proofing-your-resilience-strategy-for-tomorrows-challenges/
              • 02/19/2026
                01:00 PM
                02/19/2026
                The CISO Dilemma: Fostering Innovation & Security in the Age of AI
                https://www.truthinit.com/index.php/channel/1809/the-ciso-dilemma-fostering-innovation-security-in-the-age-of-ai/
              • 02/19/2026
                04:00 PM
                02/19/2026
                Real Talk w. IT Leaders: Top Trends in 2026
                https://www.truthinit.com/index.php/channel/1823/real-talk/
              • 02/26/2026
                01:00 PM
                02/26/2026
                HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders
                https://www.truthinit.com/index.php/channel/1833/human-dialogue-examining-the-effects-of-owasps-top-ten-agentic-risks-on-builders-and-defenders/
              • 02/26/2026
                09:30 PM
                02/26/2026
                Strategies for Safeguarding Data in the AI Era with DSPM
                https://www.truthinit.com/index.php/channel/1827/strategies-for-safeguarding-data-in-the-ai-era-with-dspm/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/

              Upcoming Spotlight Events

              • Feb
                19

                The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                02/19/202601:00 PM ET
                • Mar
                  05

                  "VMware Alternative" or "Private Cloud OS"?

                  03/05/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Feb
                    19

                    Future-proofing Your Resilience Strategy for Tomorrow's Challenges

                    02/19/202610:00 AM ET
                    • Feb
                      19

                      Real Talk w. IT Leaders: Top Trends in 2026

                      02/19/202604:00 PM ET
                      • Feb
                        26

                        HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                        02/26/202601:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Feb
                          03

                          Evolution of Cloud Adaptability and AI Performance

                          02/03/202601:00 PM ET
                          • Jan
                            27

                            AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                            01/27/202601:00 PM ET
                            • Jan
                              22

                              Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                              01/22/202601:00 PM ET
                              More events

                              Recent Industry Events

                              • Feb
                                10

                                Transforming Secure Access through Netskope One Private Access

                                02/10/202612:00 AM ET
                                • Feb
                                  03

                                  De la visibilidad a la protección: asegurando la integridad de los datos sensibles

                                  02/03/202604:00 AM ET
                                  • Jan
                                    29

                                    Transforming Secure Access through Netskope One Private Access Solutions

                                    01/29/202612:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version