Intigriti EB Hacker Report 2024
Intigriti EB Hacker Report 2024
10 From novice to expert: The educational power of 20 Financial gain continues to remain the primary
bug bounty programs in cybersecurity motivator
This is evidenced by major brands such as Microsoft, Crowdsourced security testing means CISOs can
Nestle, Coca-Cola, Monzo and Intel, all of which leverage a global community of security researchers Keep reading to unlock:
have adopted Intigriti’s bug bounty platform in to continuously test for new and undiscovered
ࠦ How ethical hacking communities become
recent years. Their engagement underscores the vulnerabilities on one platform. This approach not
an extension of your team: Access to the most
solid reputation that this form of security testing only maximizes their Return on Investment (ROI) but
current and competent security specialists in the
has established over the last five years, definitively also enhances their return on Security Investment
world.
proving its value within the cybersecurity community. (ROSI)*, enabling them to invest less now to avoid
higher costs in the future. ࠦ Tactics to elevate your security testing
A major force behind this trend is the challenge
strategies: Transition away from traditional
CISOs globally face to ensure continuous security With this Ethical Hacker Insights report, you’ll get
point-in-time testing and bring in greater
coverage of assets, particularly during periods of access to a demographic breakdown of Intigriti’s
incentivization.
rapid business growth or change. Further, in recent ethical hacking community. Plus, we’ll offer
years cybersecurity teams have had to operate with practical strategies for cybersecurity leaders to do ࠦ Strategies to enhance the appeal of your
reduced budgets , fewer staff and limited
1
more with less. program: Drive engagement and get more
resources according to Enterprise Strategy Group. results.
Knowledge is the best defense against malicious
They needed a solution that could extend their
actors. Are you ready to outsmart them?
capabilities, and many adopted crowdsourced
solutions found on platforms such as Intigriti.
Inti De Ceukelaire
CHIEF HACKER OFFICER
1
go.intigriti.com/reduced-budgets
It emphasizes that the budget spent on cybersecurity should not only be be viewed
as an investment but as a crucial prevention tactic against potentially costly and
damaging cyberattacks.
37% 12%
of Intigriti’s community are are full-time bug bounty
in full-time employment hunters We look at the researcher community as our partners,
not as our adversaries. They have a very different way of
looking at our attack surface compared to those who are
internal and potentially building the product itself.
APIs 53%
Linux 30%
Windows 18%
feel confident or very confident staying up to date Limited resources for training 31%
with emerging security threats, despite 45% of Sophistication of cyber threats 29%
respondents stating they receive no formal training
0 25% 50% 75% 100%
from their employers.
Community support
🎯 Expand our community through multi-faceted
With an average response time of one hour, our
marketing activities and provide the resources
support reps are ready to assist researchers all
and support to help researchers grow.
through the week. They ensure uninterrupted
🎯 Drive engagement on Intigriti’s platform workflow, enabling researchers to swiftly submit
through a combination of enticing bug vulnerability reports to programs. This unmatched
bounty programs, live hacking events, and responsiveness increases our reputation, brings
competitions. more hackers to our platform, and drives results for
our customers.
🎯 Elevate and amplify the profiles of high-
performing researchers, particularly those Unrivalled triage
pioneering ground-breaking vulnerability Intigriti’s triage team is the glue between our
research. researchers and our customers. As security analysts
RESEARCHER
themselves, they are perfectly suited to facilitate
fattselimi
communication and provide support to both parties,
ensuring seamless collaboration and enablement in
both directions.
Renniepak
INTIGRITI SECURITY RESEARCHER
The outcomes of these retests are mostly positive, with 65% of researchers
finding that the vulnerabilities are generally fixed. However, 14% noted that the
vulnerabilities required further remediation steps, and 21% discovered new issues
during retesting. This encapsulates the dynamic nature of cybersecurity, where
fixing one issue can sometimes reveal others.
Furthermore, only 32% of these researchers think that traditional pentesting would
identify many of the same vulnerabilities uncovered during bug bounty hunting,
suggesting that bug bounty programs are more effective in finding diverse and
unexpected issues in a more creative way. This highlights the necessity for more
dynamic and ongoing security measures.
RESEARCHER
deleite
Objective Focused testing for Thorough and continuous Focused testing for
regulatory compliance testing to maintain regulatory compliance
and proactive security proactive security and proactive security
measures measures
Proactively inviting researchers to retest vulnerabilities after they’ve been fixed according to hackers:
The survey results also highlight the critical role of retesting in vulnerability
management in the eyes of our community, with 99% of respondents affirming its
importance to a varying degree. This consensus reinforces that retesting provides a
crucial layer of assurance in maintaining robust security practices.
It requires little time and resources, and so companies should make the effort 20%
Bruhbey
However, the driving force behind the participation of 77% of researchers in bug
bounty programs is financial rewards.
To learn 75%
managed triage team ensured that Personio’s value from day one and can influence internal
platform was continuously tested by top decisions in the application security program.
Streamlined processes
Book a meeting today
Our legal framework ensures swift payment processing in days, outpacing the industry standard by
Or go to go.intigriti.com/EHR24-contact
weeks.
Program oversight
Trusted by the world’s largest organizations Our dedicated technical customer success team is committed to attracting top-tier security
researchers to your program, while conducting regular reviews to ensure sustained momentum
post program launch.
Total vulnerability
reports have been filed
€26M+
400+ Rewards paid
32
to the community
Active programs
Countries serviced
with our solutions
www.intigriti.com [email protected]