Request a Demo Contact Us

How to Hack with InsiderPhD: Bug Bounty Resources

 

Bug Bounty Resources

Narrowing in on a hacker resource that works for your learning style can be tough. Watch along as Katie outlines her favorite resources and let us know which one works best for you!

About the Author


Katie is a lecturer of Cyber Security at Manchester Metropolitan University and an Early Career Researcher in the domain of Security Research. She is a PhD from Cranfield University, studying natural language processing and insider threat. Her research roughly revolves around the intersection of AI/ML and InfoSec, both in how AI/ML can improve security applications and processes, supporting practitioners rather than supplanting them and the security of AI/ML systems. She’s very interested in pedagogy and teach on MMU’s Cyber Security degree program at Degree Apprenticeship, Undergraduate and Postgraduate level. She’s interested in new teaching methods and incorporating gamification and interactivity into lectures. She speaks at conferences and events fairly often and has had the pleasure to speak at CISA’s (Cyber Security and Infrastructure Agency) Cybersummit, BlackHat, British Computing Society, OWASP (Open Web Application Security Project) as well as speaking at events with industry partners.

In her free time she is an occasional bug bounty hunter, and makes educational cyber security YouTube videos for an audience of over 30,000 people! She used to work at Bugcrowd where she helped provide support to the community team in all things InfoSec and bug hunting. Although she is a data scientist/engineer at heart, security is really growing on her and she says it’s been great to leverage her data brain to help make the internet more secure. She’s now found herself knee deep in cyber security, having reported security vulnerabilities to large organizations such as Verizon Media and the US Department of Defense.

Want more from InsiderPhD? Follow her on Twitter here!

More resources

Guide

Ultimate Guide to AI Security

Read More
Datasheet

Aligning with Binding Operational Directive 20-01

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.