CYBER DEFENSE CENTER performs security research and cyber defense testing on a contractual basis for several original equipment manufacturers and companies building or using unique to niche products that they want to expose to comprehensive security testing. This includes traditional vulnerability testing with a much wider tool set, penetration testing, fuzzing, customized testing, and other advanced testing techniques to help you identify the security weaknesses or optimization opportunities in your product. CYBER DEFENSE CENTER has several testing options to choose from and uses the rules of responsible disclosure in communicating or facilitating bug/vulnerability disclosures to the impacted or responsible parties. Please read more about our rules of responsible disclosure and our disclosure assistance program below.
CYBER DEFENSE CENTER can directly sponsor your bug bounty by providing your product and the associated bounty exclusively to the lab’s members. This ensures disclosure rules and disclosure assistance will be followed as an obligation under the lab’s member contracts. When restricting the testing to CYBER DEFENSE CENTER members, your product is subject to testing by hundreds of veterans, college students, and the lab’s professional mentors with various specialties in cyber defense. The lab requires an extended testing period when compared to conference bounties and provides a Cyber Defense Center testing seal when research and extended testing are completed.
Contact us today to learn more about CYBER DEFENSE CENTER exclusive testing for your products. The sooner you start, the sooner your product can be optimized against threats
Once your company has established a bug bounty through the CYBER DEFENSE CENTER, we can facilitate the introduction of your product and the associated bounty at Blackhat or DefCon through a product aligned village. The bounty can be sponsored by your company or by the CYBER DEFENSE CENTER directly, to keep your company’s participation in the bounty anonymous. This requires a contractual obligation and funding requirement for the bounty prior to submission. Both the CYBER DEFENSE CENTER and the aligned village receive a small portion of the bounty as a donation to sponsor the bounty and provide disclosure assistance. The remainder is paid directly to the cyber security researcher/hacker once verification and validation steps are concluded. There is risk with this bounty program. CYBER DEFENSE CENTER, Defcon, nor the facilitating village, can require the researcher to disclose their findings for bounty consideration.
Contact us today to learn more about CYBER DEFENSE CENTER hacker conference testing. Hacker conference testing allows you to observe and modify test parameters. You can also keep your company's name off bounties while receiving the benefits of disclosure.
CYBER DEFENSE CENTER also participates in networks that can expose your product to Crowd testing by thousands of hackers, worldwide. CYBER DEFENSE CENTER can either facilitate your bounty or directly represent the bounty within these forums. This is the most comprehensive testing option but also comes at a potential disclosure risk with a much wider reach.
This is the fastest path to testing results. Allow CYBER DEFENSE CENTER to facilitate your crowd hacker bounties today.
CYBER DEFENSE CENTER can help your company write testing challenges, design trophies, and publish rules of engagement that restrict or limit the testing parameters. Ideally, testing has no rules of engagement but in many cases, such as the performance of interactive product testing in physical proximity, in order to preserve the products operational state, CYBER DEFENSE CENTER can prohibit parameters of testing that may damage the product. An example of this is restricting power attacks that may otherwise damage or destroy circuits, boards, or electronic operations rendering the product unusable for further testing. If there is a requirement to preserve the products’ ongoing operation state or integrity, CYBER DEFENSE CENTER can help design a test that is intended to optimize testing to achieve desired outcomes.
Just need assistance in designing or writing your security testing plans? Reach out to CYBER DEFENSE CENTER to independently design your security testing for your specific product or service.
1) EXCLUSIVE - CYBER DEFENSE CENTER HACKER BOUNTY
2) HACKER CONFERENCE BOUNTY
3) CROWD HACKER BOUNTY
4) CHALLENGES AND RULES OF ENGAGEMENT
CONFERENCE TESTING:
CYBER DEFENSE CENTER can participate in any conference or multiple conferences to aid in the facilitation of HACKER CONFERENCE BOUNTIES. This can be an industry specific conference associated with your product or a security industry conference. Conferences that CYBER DEFENSE CENTER can or you can choose from the following:
1) RSA Conference; or
2) Blackhat; or
3) Hacker Halted; and
4) Defcon Las Vegas.
CERTIFICATION:
When testing includes the exclusive CYBER DEFENSE CENTER hacker bounty or the CYBER DEFENSE CENTER designs the product testing parameters and facilitates either crowd or conference bounties, security testing certification from the CYBER DEFENSE CENTER may be included in the scope of testing.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.