HEAD TO HEAD. Bug Bounties vs. Penetration Testing. How the crowdsourced model is disrupting traditional penetration testing.
|
|
- Ami Skinner
- 6 years ago
- Views:
Transcription
1 HEAD TO HEAD Bug Bounties vs. Penetration Testing How the crowdsourced model is disrupting traditional penetration testing. 1
2 What is the current state of penetration testing? Penetration testing has become the de facto best practice for vulnerability assessment over the past decade, but in recent years has come into question, as data breaches continue to hit corporations with extensive penetration testing programs. The newest addition to the vulnerability assessment toolkit, bug bounty programs, are disrupting this traditional market and calling the effectiveness of the penetration test model into question. In this resource, you will learn The fundamental differences between penetration testing and bug bounty models 2. How the bug bounty model improves vulnerability assessment ROI 3. Why the bug bounty model is gaining traction among enterprise organizations 2
3 How does the Organizations connect with independent security researchers with diverse expertise and skills. bug bounty model work? Bug bounties harness the power and diversity of the crowd to find more critical security vulnerabilities missed by penetration tests and automated scanners, providing continuous and scalable coverage. The crowd reports security vulnerabilities in all types of products, from web and mobile to hardware. Valid findings are rewarded; the more severe the bug, the higher the reward. 3
4 The bug bounty model improves upon penetration testing in 3 fundamental ways: Testers The volume and diversity of the testers in bug bounties outperform the penetration test model. Coverage Unlike a point-in-time assessment, bug bounties provide continuous and scalable security coverage. Model The bug bounty pay-for-results model incentivizes greater depth and breadth of findings. 4
5 1 Uncover more high-quality vulnerabilities with a large and trusted crowd of testers. Standard penetration tests are performed by a small number of testers, fundamentally limiting the perspectives and expertise brought to a project. AVERAGE NUMBER OF TESTERS IN A BOUNTY PROGRAM VS. A PENETRATION TEST Bug bounties exponentially increase the testing talent available and are just as safe as standard penetration tests. 5
6 KEY BUGCROWD COMMUNITY STATS 60% 60% of our active crowd have full time security jobs including penetration testers and security engineers. 120 In the crowd, over 120 countries are represented; the leading nations are India, United States, United Kingdom, Australia and Pakistan. 18 We ve identified 18 distinct areas of hacking expertise within the crowd including web, Android, ios, hardware, firmware, Linux, network, and more. 81% 81% have completed some level of higher-education, many of whom studied Engineering or Computer Science. Creativity, skill, and diversity Not only is the testing pool much larger, but it is also more diverse, providing organizations with a broad set of skills and expertise. Get an inside peek at the crowd > 6
7 2 Ensure constant security coverage with continuous and scalable security assessment. The penetration testing model is limited in flexibility and only offers point-in-time assessment of code. VULNERABILITY ASSESSMENT COVERAGE OVER TIME BUG BOUNTY Security assessment should be continuous, especially as development processes become more agile. Penetration testing can t offer that coverage. Bug bounties can. SECURITY COVERAGE PENETRATION TEST CODE RELEASE PENETRATION TEST CODE RELEASE TIME 7
8 BUGCROWD S BOUNTY SOLUTIONS Continuous, flexible, and scalable Private or Public Public programs are open to the entire crowd and receive high visibility and activity over time. With private programs, organizations can test within invitation-only environments and attract testers with skill sets based on their application needs. Learn about Public and Private Programs > Continuous or On-Demand While continuous programs provide 24/7 activity and coverage, on-demand programs can be used to test new products and features, or to fulfill pen testing needs. They allow organizations to utilize the crowdsourced model with a fixed investment. Learn about Bugcrowd On-Demand > Bugcrowd s bug bounty model allows organizations to leverage the power of the crowd in more ways than one. 8
9 3 Pay-for-results, not man-hours for improved quality and volume of vulnerabilities. The penetration testing model incentivizes effort only and does nothing to incentivize high-quality results or volume. Bug bounties utilize a pay-for-results model that encourages deeper and more focused testing. Higher severity bugs carry a bigger incentive. PENETRATION TEST RESULTS BUG BOUNTY RESULTS BUG BOUNTY FINDINGS VS. FINDINGS These results represent actual results of a Fortune 500 company s first 30 days of bug bounty findings compared to their penetration test results on the same scope. Read the full program details on the next page. Critical High Medium Low 9
10 How One Fortune 500 Company Replaced their Penetration Tests BUGCROWD CUSTOMER CASE STUDY and Achieved 6x ROI Program type: Initially launched as a private program limited to 50 vetted researchers, this Fortune 500 company launched its public program after three months. Applications in scope: multiple web applications spanning multiple databases and technologies Reward range: $100 to $3000 After years of running quarterly penetration tests across hundreds of domains and technologies, this financial services company recognized the need for a more scalable and innovative solution. With highly-sensitive data and complex and vast technologies, they knew they weren t receiving the continuous coverage they needed. They implemented a bug bounty program to Expand the breadth and diversity of their testing pool Scale their testing efforts across a more broad attack surface Incentivize researchers to find and submit high-criticality vulnerabilities Through the improved model and breadth and depth of testers, a bug bounty program vastly improved their vulnerability assessment results and ROI. 90 vulnerabilities were reported to this Fortune 500 company s program within 30 days compared to just 15 discovered by their previous penetration test. They also received 7 times as many critical and high severity vulnerabilities. 10
11 Powerful Technology How do Bugcrowd programs deliver success? Our powerful management platform, Crowdcontrol, efficiently and simply connects our crowd of researchers to your team, saving you time and money. Through Bugcrowd s automated triage and expert validation, you only receive actionable vulnerabilities. Learn more about Crowdcontrol > Expert Management Our security experts deliver in-depth program strategy and management expertise for every customer. Reduce the time and cost of communicating with researchers and managing submissions with dedicated support for every program running on our platform. Learn more about our team > Trusted Crowd Our crowd brings together tens of thousands of researchers that think like adversaries but act as allies to find vulnerabilities before they can be exploited. Bugcrowd s private programs offer crowd curation through a unique blend of behavioral data science and expert selection. Learn more about the crowd > 11
12 Getting Started As the leading bug bounty provider, Bugcrowd is mastering the science of bug bounties. We ve taught the market that they aren t one-size-fits-all, but in fact, come in many different shapes and sizes. We know what it takes to launch and run a successful bug bounty program, tailored specifically to your organization. Visit bugcrowd.com/introduction to learn more. The pioneer and innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of tens of thousands security researchers to surface critical software vulnerabilities and level the playing field in cybersecurity. Bugcrowd also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements. Bugcrowd s proprietary vulnerability disclosure platform is deployed by Drupal, Pinterest, Western Union and many others. Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Venture Capital, Industry Ventures, Paladin Capital Group, Rally Ventures and Salesforce Ventures. Bugcrowd is a trademark of Bugcrowd, Inc. 12
Crowdsourced Security at the Government Level: It Takes a Nation (of Hackers)
SESSION ID: ASD-W11 Crowdsourced Security at the Government Level: It Takes a Nation (of Hackers) Jay Kaplan CEO/Cofounder Synack @JayKaplan whois jay@synack.com @jaykaplan www.synack.com leverages the
More informationTHE STATE OF BUG BOUNTY
THE STATE OF BUG BOUNTY Bug Bounty: A cooperative relationship between security researchers and organizations that allow the researchers to receive rewards for identifying application vulnerabilities without
More informationRunning a Bug Bounty Program
Running a Bug Bounty Program Julian Berton Application Security Engineer at SEEK Web developer in a previous life Climber of rocks Contact Twitter - @JulianBerton LinkedIn - julianberton Website - julianberton.com
More information2016 Bug Bounty Hacker Report
Who are these bug bounty hackers? hacker /ha ker/ one who enjoys the intellectual challenge of creatively overcoming limitations. September 2016 Contents Introduction How do we define hacker? Highlights
More informationRecruiting Game- Changing Talent
White Paper Recruiting Game- Changing Talent Target the Best in an Ever-Changing Talent Landscape Talent acquisition continues to be one of the most urgent issues for companies, and the pressure to have
More informationJoint Information Environment. White Paper. 22 January 2013
White Paper "To fight and conquer in all bottles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance without fighting." -Sun Tzu "Some people think design means how
More informationSuccess through Offshore Outsourcing. Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts)
Success through Offshore Outsourcing Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts) Offshore Outsourcing Today Outsourcing Viewed as Strategic Value Target set Higher Multi-year
More informationFollow the Money: Security Researchers, Disclosure, Confidence and Profit
Follow the Money: Security Researchers, Disclosure, Confidence and Profit SESSION ID: ASEC-R04A Jake Kouns Chief Information Security Officer Risk Based Security @jkouns Carsten Eiram Chief Research Officer
More informationHow to Succeed with Your Bug Bounty Program
The world s leading Vulnerability Coordination and Bug Bounty Platform How to Succeed with Your Bug Bounty Program Foreword Thank you for downloading this ebook about how your organization can learn from
More informationPenetration Testing Is Dead! (Long Live Penetration Testing!)
Penetration Testing Is Dead! (Long Live Penetration Testing!) Katie Moussouris Chief Policy Officer HackerOne http://hackerone.com http://twitter.com/k8em0
More informationGATEWAY TO SILICON VALLEY SAMPLE SCHEDULE *
GATEWAY TO SILICON VALLEY SAMPLE SCHEDULE * Ignite your entrepreneurial spirit and accelerate your ideas/company over one week. DAY 1: MONDAY 09:00 10:00AM SVI ACADEMY, PROGRAM INTRODUCTION 10:00 11:15AM
More informationCWE TM COMPATIBILITY ENFORCEMENT
CWE TM COMPATIBILITY ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module
More informationBug Bounty programs in Switzerland? Florian Badertscher, C1 - public
Bug Bounty programs in Switzerland? Florian Badertscher, 04.10.2016 C1 - public About me 2 Security Analyst at Swisscom CSIRT, since 2015 Incident handling Develop monitoring infrastructure Security initiatives
More informationYouth Career Initiative
Youth Career Initiative Strategy & Growth Plan 2015 2019 Youth Career Initiative is a programme of the International Tourism Partnership, which is part of Business in the Community DECEMBER 2014 Strategy
More informationBUG BOUNTY BUZZWORD BINGO DEEP DIVE UNDER A JUMPED SHARK
SESSION ID: EXP-R02 BUG BOUNTY BUZZWORD BINGO DEEP DIVE UNDER A JUMPED SHARK Katie Moussouris Founder and CEO Luta Security @k8em0 (that s a zero, pronounced Katie Mo, not Kate Emo!) @LutaSecurity (pronounced
More informationABOUT MONSTER GOVERNMENT SOLUTIONS. FIND the people you need today and. HIRE the right people with speed, DEVELOP your workforce with diversity,
FEDERAL SOLUTIONS ABOUT MONSTER GOVERNMENT SOLUTIONS FIND the people you need today and the leaders of tomorrow HIRE the right people with speed, efficiency, and security DEVELOP your workforce with diversity,
More informationUNLEASHING INNOVATION: LEARN FROM THE LEADERS
UNLEASHING INNOVATION: LEARN FROM THE LEADERS CITIZENS WANT MORE GOVERNMENT INNOVATION An Accenture survey of more than 6,000 CITIZENS in SIX COUNTRIES revealed: 6 IN 10 CITIZENS 8 IN 10 CITIZENS view
More informationLeaders Sport Tech Startup Competition. Stamford Bridge, London 6 October 2016
Leaders Sport Tech Startup Competition Stamford Bridge, London 6 October 2016 Foreword CONTENTS 3. Process 6. The Finalists 8. Winners Interview FOREWORD A t deltatre we define ourselves as the 30 year
More informationTalent Crowdsourcing: The Quick Guide
Talent Crowdsourcing: The Quick Guide An introduction to the industry-changing new trend in recruiting talent. YOUR LOGO Contents Preface..... 3 What is Crowdsourcing?... 4 What is Talent Crowdsourcing?...
More informationWHITE PAPER. The four big waves of contact center technology: From Insourcing Technology to Transformational Customer Experience.
WHITE PAPER The four big waves of contact center technology: From Insourcing Technology to Transformational Customer Experience www.servion.com Abstract Contact Centers (CC) are one of the most critical
More informationGuide to the SEI Partner Network
Guide to the SEI Partner Network January 2018 Your Guide to Delivering SEI Services The SEI Partner Network is a premier group of organizations that deliver time-tested, proven services developed by the
More informationStreamlining care processes with a data-driven approach
Streamlining care processes with a data-driven approach With Innovaccer s efficient and end-to-end care management solution Case Study Leading Iowa-based Mercy ACO deployed InCare to enable every member
More informationOVERVIEW. Helping people live healthier lives and helping make the health system work better for everyone
OVERVIEW Helping people live healthier lives and helping make the health system work better for everyone About UnitedHealth Group UnitedHealth Group helps drive positive change in health care in the United
More informationSmall business Big ambitions
HIRE MARKET SELL LEARN Small business Big ambitions Hiring Playbook for SMBs It doesn t cost you anything to think big nor reach beyond the supposed constraints of size and resources. Don t limit your
More informationPrepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017
Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Thank you for the invitation to speak to you today. It s a real pleasure
More informationCROWDFUNDING UNIVERSITY RESEARCH
CROWDFUNDING UNIVERSITY RESEARCH...because it takes a village to fund the answers Professor Deb Verhoeven @bestqualitycrab Crowdfunding Industry Deb Verhoeven @bestqualitycrab Fundable Infographic 2014
More information1.5. Indo-German-Swiss Bootcamp Calling Entrepreneurs for
Calling Entrepreneurs for nd th April 2 April 11, 2018 Exchange between Indian, German and Swiss Start-Ups in the Healthcare Sector 1.5 week Bootcamp Start-ups in India 15from India, Germany & Switzerland
More informationknow? Did you Empowering and Accelerating the Modern Business
Life at Oracle Did you know? Oracle offers an integrated array of applications, databases, servers, storage, and cloud technologies to empower modern business. We work with the top companies across almost
More informationCanadian Accelerators
Canadian Accelerators Company Focus Conditions Description Sherbrooke,QC Innovative firms and/or start-up technologies Cash investment up to $20,000, professional services in kind, and 5% equity investment
More informationWhat you need to know about Crowdfunding
What you need to know about Crowdfunding CCIA Spring 2018 Conference Heather McGee Decauwer Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC registered investment
More informationInvesting in Opportunity Act
Investing in Opportunity Act REQUEST FOR LETTERS OF INQUIRY JUNE 2018 Opportunity Zone LOI Qualifications Form Thank you for your interest in submitting a Letter of Inquiry to The Kresge and Rockefeller
More informationHacking Bootcamp: Learning The Basics Of Hacking By C.J. McAllister, David Maxwell
Hacking Bootcamp: Learning The Basics Of Hacking By C.J. McAllister, David Maxwell If searched for a ebook Hacking Bootcamp: Learning the Basics of Hacking by C.J. McAllister, David Maxwell in pdf format,
More informationService Year Recruitment Best Practices
Service Year Recruitment Best Practices Public awareness of what a service year is a significant barrier to recruiting qualified candidates for service year positions. In a market survey that Service Year
More informationGlobal Recruitment Solutions Helping healthcare recruiters to reach further than ever before, all from one, easy-to-use professional career portal.
Global Recruitment Solutions Helping healthcare recruiters to reach further than ever before, all from one, easy-to-use professional career portal. Competition for healthcare talent is extremely high,
More informationFrom Technology Transfer To Open IPR
From Technology Transfer To Open IPR The traditional models to release the research finding from many institutions like Universities, are in most of the cases badly outdated and broken. Leading a big portion
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More informationFreelancer launches API
20 December 2017 Freelancer launches API Task Humans from Software Matt Barrie Chief Executive Officer Freelancer.com is changing the global dynamics in the marketplace for people 2 Use the Freelancer
More informationAtos Global FinTech program: A catalyst for innovation in Financial Services
Atos Global FinTech program: A catalyst for innovation in Financial Services Atos Global FinTech program: A catalyst for innovation in Financial Services Atos and FinTech: Quick facts Atos has launched
More informationAVIONICS CYBER TEST AND EVALUATION
AVIONICS CYBER TEST AND EVALUATION Joseph Nichols, PhD Technical Advisor for Flight Test and Evaluation Air Force Test Center Edwards AFB CA joseph.nichols.13@us.af.mil 1 Defining avionics cyber testing
More informationIntegrated Offshore Outsourcing Solution
Integrated Offshore Outsourcing Solution Continuous improvement, productivity and innovation through consolidation of Business Process and IT outsourcing Krishnan Narayanan and Jacob Varghese Introduction
More informationCHAPTER 2 TECHNOLOGY BUSINESS INCUBATORS GLOBAL SCENARIO
22 CHAPTER 2 TECHNOLOGY BUSINESS INCUBATORS GLOBAL SCENARIO The business incubators were first established in United States of America during late 1970s. Growth accelerated in 1970s and 1980s largely as
More informationThe Guide to Smart Outsourcing (Nov 06)
The Guide to Smart Outsourcing (Nov 06) JOSH BERSIN, PRINCIPAL, BERSIN & ASSOCIATES The outsourcing market is on fire, proclaims one industry insider. Overall, companies are spending more on outsourcing
More informationCourtesy of Mark F. Weiss
Page 1 of 5 Published in Anesthesiology News April 2011 HOW TO NAVIGATE THE RISING TIDE OF AGGRESSIVE RFPs BY: MARK F. WEISS, J.D. Hospitals increasingly are disrupting their relationships with their longstanding
More informationTHE HIGH PRICE OF HEALTHCARE THREE MISTAKES IN US HEALTHCARE THAT EMERGING ECONOMIES CAN T AFFORD TO REPEAT
THE HIGH PRICE OF HEALTHCARE THREE MISTAKES IN US HEALTHCARE THAT EMERGING ECONOMIES CAN T AFFORD TO REPEAT Sam Glick Sven-Olaf Vathje 1 The healthcare system in the United States, with its technological
More informationEmployer Branding at GoDaddy
Employer Branding at GoDaddy How Proactive Talent Strategies Got Employees Talking & Increased Applications Let us show you what Proactive can do for your organization. will@proactivetalent.io (855) 706-8568
More informationConnecting Startups to VC Funding in Canada
Technology & Life sciences Connecting Startups to VC Funding in Canada introduction While the majority of respondents have accessed early seed investment from friends, family and angel investors, many
More informationCHIEF OF AIR FORCE COMMANDER S INTENT. Our Air Force Potent, Competent, Effective and Essential
CHIEF OF AIR FORCE COMMANDER S INTENT Our Air Force Potent, Competent, Effective and Essential Air Marshal Leo Davies, AO, CSC 4 July 2015 COMMANDER S INTENT Air Marshal Leo Davies, AO, CSC I am both
More informationBersin LTI Research Study Bersin & Associates August, 2003
Learning Management Systems: Usage and Implementation Bersin LTI Research Study Bersin & Associates August, 2003 Bersin & Associates and LTI Magazine 1 August, 2003 Usage and Implementation of Learning
More informationGlobal Business Services Better together
Global Business Services Better together What is Global Business leaders are recognising the benefits of leveraging shared services and outsourcing consistently across multiple functions and regions. Organisations
More informationSCAMPI B&C Tutorial. Software Engineering Process Group Conference SEPG Will Hayes Gene Miluk Jack Ferguson
Pittsburgh, PA 15213-3890 SCAMPI B&C Tutorial Software Engineering Process Group Conference SEPG 2004 Will Hayes Gene Miluk Jack Ferguson CMMI is registered in the U.S. Patent and Trademark Office by Carnegie
More informationEngaging, empowering technology
Breadth and depth of global consulting Engaging, empowering technology Greatest broking experience & solutions 340 Multinational Client Group colleagues 100 health management specialists Access to 450
More informationFY2025 Master Plan/ FY Strategic Plan Summary
FY2025 Master Plan/ FY2016-19 Strategic Plan Summary April 2016 Key Planning Concepts GSFB Mission Statement & Core Values The mission of Good Shepherd Food Bank is to eliminate hunger in Maine by sourcing
More informationJobvite and GroupM Team Up to Create Recruiting Success
Jobvite and GroupM Team Up to Create Recruiting Success PROBLEM Established Global Company in Need of Central, Comprehensive ATS SOLUTION Jobvite Hire and Engage RESULTS Decreased Time to Hire, Increased
More informationIBM in China A Short Overview
IBM in China A Short Overview IBM in China A Short Overview 2 Our journey of growth with China IBM re-established its business relations with China in 1979, shortly after the country announced its economic
More informationA RECRUITER S SOCIAL RECRUITING SURVIVAL GUIDE MASTER THE SOCIAL ARENA icims Inc. All Rights Reserved.
A RECRUITER S SOCIAL RECRUITING SURVIVAL GUIDE MASTER THE SOCIAL ARENA Social Recruiting Defined Social recruiting is when companies and recruiters use social platforms to source and recruit candidates
More informationHORIZON The Structure and Goals of the Horizon 2020 Programme. Horizont 2020 Auftaktveranstaltung München, 04. Dezember 2013
HORIZON 2020 The Structure and Goals of the Horizon 2020 Programme Horizont 2020 Auftaktveranstaltung München, 04. Dezember 2013 Wolfgang Boch Head of Unit EC, DG CONNECT The Multiannual Financial Framework
More informationLOE 1 - Unified Network
LOE 1 - Unified Network COL Denise Brown and COL Mark Parker UNCLASSIFIED//FOUO//PRE-DECISIONAL//DRAFT 1 CSA s Principles, Characteristics and Requirements Principles (Why) Warfighting Requirements Characteristics
More informationOhio Third Frontier Program
Ohio Third Frontier Program Overview Created in 2002, the Ohio Third Frontier is an unprecedented commitment to create new technology-based products, companies, industries and jobs. In May, the Ohio Third
More informationMC Network Modernization Implementation Plan
MC Network Modernization Implementation Plan Mission Command Center of Excellence 1 Principles (Why) Warfighting Requirements CSA s Mission, Principles, Characteristics of the Network & Requirements Network
More informationOUTSOURCING IN THE AGE OF INTELLIGENT AUTOMATION
OUTSOURCING IN THE AGE OF INTELLIGENT AUTOMATION FOREWORD The emergence of intelligent automation is a watershed event in the life of outsourcing. Enterprises, which used to farm out business processes
More informationA total 52,886 donations were given during the 24-hour, online giving day raising more than $7.8 million from 18,767 donors.
On May 24, 2017, a record 923 nonprofit organizations shared their stories of impact and rallied donors across the region during the fifth annual Omaha Gives. A total 52,886 donations were given during
More informationRECRUITMENT AND EXECUTIVE SEARCH FOR THE MEDIA AND ENTERTAINMENT SECTORS
RECRUITMENT AND EXECUTIVE SEARCH FOR THE MEDIA AND ENTERTAINMENT SECTORS 1 WHO ARE WE? Our purpose is to provide top-class search services to all sectors of the media and entertainment industries by delivering
More informationMobil.ity PR EVALUATION REPORT. January 1 June 30, 2010 POWERED BY
PR EVALUATION REPORT January 1 June 30, 2010 PR Helped... GENERATE SALES LEADS 1 2 3 A 30 in increase in coverage directly impacted web traffic, sales leads, and helped drive sales in the US, EMEA and
More informationUSING JOBVITE TO OVERCOME THE STEM SKILLS SHORTAGE
USING JOBVITE TO OVERCOME THE STEM SKILLS SHORTAGE CHALLENGE Rapid talent attraction in a time of growth SOLUTION Jobvite Refer Jobvite Engage Jobvite Hire RESULTS 30% of hires came through referrals in
More informationDigital Access to Collections
Digital Access to Collections Update @ 20 October Initial focus 2 workshops in 2017 - Locations - Venues - Website - Grants program - Marketing - Training content 2 Locations for regional workshops The
More informationNational Grid Ventures. Lisa Lambert, SVP, CTIO June 2018
National Grid Ventures Lisa Lambert, SVP, CTIO June 2018 Lisa Lambert Education MBA, Harvard Business School BS/MIS, Pennsylvania State University Executive Education, Stanford University UPWARD www.upwardwomen.org/
More informationNEW VENTURES FUND REPORT FISCAL YEAR INNOVATION TO IMPACT. Celebrating Five Years of Success
NEW VENTURES FUND REPORT FISCAL YEAR 2015-2016 INNOVATION TO IMPACT Celebrating Five Years of Success NEW VENTURES FUND REPORT 2015-2016 1 Meet Nancy She built a toilet at home. The barrier to a simple
More informationTo be prepared for war is one of the most effectual means of preserving peace.
The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are
More informationIT JOBS MARKET DUBLIN Salary Survey April 17
IT JOBS MARKET DUBLIN Salary Survey April 17 1 IT JOBS MARKET DUBLIN Salary Survey April 17 TH ANNIVERSARY 2 CONTENTS 02 Contents 03 About Archer 04 Market Overview 05 Application & Software Development
More informationThe Fintech Revolution: Innovate at the Speed of Technology
EBOOK The Fintech Revolution: Innovate at the Speed of Technology Collaborating with Financial Institutions to Create Innovative and Engaging Financial Applications for Your Consumers. 1 Table of Contents
More informationHEALTHCARE STAFFING EDUCATION & TRAINING SEARCH
HEALTHCARE STAFFING EDUCATION & TRAINING SEARCH May 2007 This presentation contains forward-looking statements. Statements that are predictive in nature, that depend upon or refer to future events or conditions
More informationAugusta Innovation District DR. ED EGAN, DIRECTOR MCNAIR CENTER FOR ENTREPRENEURSHIP AND INNOVATION
Augusta Innovation District DR. ED EGAN, DIRECTOR MCNAIR CENTER FOR ENTREPRENEURSHIP AND INNOVATION High-growth, high-tech as a driver of U.S. economic growth The big picture u U.S. GDP growth is currently
More informationInternal Audit Co-sourcing
www.pwc.com.cy Internal Audit Co-sourcing The PwC Internal Audit Enhancing the value of your Internal Audit function whilst keeping you in control As a business that s going places, we believe you can
More informationUS Startup Outlook 2018
US STARTUP OUTLOOK 2018 1 US Startup Outlook 2018 A Silicon Valley Bank survey of US entrepreneurs about business conditions and policy priorities LETTER FROM SVB CEO US STARTUP OUTLOOK 2018 2 Startups
More informationLAGOS STATE GOVERNMENT SENSITIZATION ON CREATIVITY AND INNOVATION FOR PUBLIC SERVANTS.
LAGOS STATE GOVERNMENT SENSITIZATION ON CREATIVITY AND INNOVATION FOR PUBLIC SERVANTS. MAINSTREAMING THE CULTURE OF CREATIVITY AND INNOVATION IN THE LAGOS STATE PUBLIC SERVICE BY TOYIN R. ANJOUS-ADEMUYIWA
More informationCyber Operations in the Canadian Armed Forces. Master Warrant Officer Alex Arndt. Canadian Forces Network Operations Centre
Cyber Operations in the Canadian Armed Forces Master Warrant Officer Alex Arndt Canadian Forces Network Operations Centre Chief Canadian of Force Armed Development Forces / Chef / Forces du Développement
More informationSTEMchain Solution Overview
STEMchain Solution Overview Table of Contents Executive Summary, The Giving Market, and Partner Organizations and Funders How Blockchain Works and STEMchain on the Stellar Network Current Problem Proposed
More information40,000 Covered Lives: Improving Performance on ACO MSSP Metrics
Success Story 40,000 Covered Lives: Improving Performance on ACO MSSP Metrics EXECUTIVE SUMMARY The United States healthcare system is the most expensive in the world, but data consistently shows the U.S.
More informationAfrica is a land of tremendous wealth and enormous
Africa is a land of tremendous wealth and enormous untapped potential. We are a young continent. Today, we have 420 million young people aged 15 to 35. By 2050, the numbers are expected to double to almost
More informationWhat is WaterCredit? Why is WaterCredit Needed?
What is WaterCredit? WaterCredit is an initiative of Water.org that puts microfinance tools to work in the water and sanitation (watsan) sector. It is the first comprehensive program of its kind that connects
More informationHelmholtz-Inkubator INFORMATION & DATA SCIENCE
Helmholtz-Inkubator Incubator INFORMATION & DATA SCIENCE Weiterentwicklung Further developing eines an innovative, neuartigen, association-wide gemeinschaftsweiten approach Ansatzes Last Stand: updated:
More informationImproving Outcomes in a Value-Based World Through Stratified Data and Patient Nurturing. Tuesday November 3, :15 AM - 10:30 AM
Improving Outcomes in a Value-Based World Through Stratified Data and Patient Nurturing Tuesday November 3, 2015 9:15 AM - 10:30 AM Presenter(s): Bob Dichter - Senior Director, Product Management Brian
More informationBetter health. Better bottom line.
Better health. Better bottom line. Tailored well-being solutions to improve health and lower costs 847987 06/11 The Power of Well-Being To us, well-being is more than just promoting physical wellness.
More informationGo-to-Market Strategy Update
Go-to-Market Strategy Update Rick Mahoney, VP, Worldwide Sales and Customer Excellence 1 2017 ANSYS, Inc. September 14, 2017 ANSYS business fundamentals are strong Digital revolution and pervasive simulation
More informationA Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities Jukka Ruohonen University of Turku Email: juanruo@utu.fi Luca Allodi Eindhoven University of Technology Email: l.allodi@tue.nl Abstract
More informationPerformance Insight. Vol. 01 PATIENT ENGAGEMENT athenahealth, Inc. All rights reserved.
Performance Insight Vol. 01 PATIENT ENGAGEMENT 2015 athenahealth, Inc. All rights reserved. If patient engagement were a drug, it would be the blockbuster drug of the century and malpractice not to use
More informationRAS. Providing innovative solutions to challenging EW/ELINT problems for the DoD and all the US Services. 111 Dart Circle Rome, NY
111 Dart Circle Rome, NY 13441 www.ras.com Providing innovative solutions to challenging EW/ELINT problems for the DoD and all the US Services Mission Statement To solve technically challenging problems
More informationThe State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017
The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating
More informationImproving competitiveness through discovery research
Introduction Canada s universities are committed to working with all Parliamentarians to enhance the country s productivity and competitiveness, and we welcome the House of Commons Standing Committee on
More informationReuters Insources Software Development Offshore
Case Studies, D. Wiggins Research Note 29 July 2003 Reuters Insources Software Development Offshore Through refined processes and continuous training, Reuters has moved a large part of its software development
More informationBusiness Incubation FAQ
Business Incubation FAQ What is the objective of Business incubation? Schneider Electric s Business Incubation initiative has been created with the intent of identifying new growth opportunities at the
More informationNurse Call Communication System
Nurse Call Communication System GE is making a renewed commitment to health. With the same spirit of innovation that inspired Thomas Edison to develop the light bulb, we re putting our energy into creating
More informationbd.com Pyxis Enterprise Server
Pyxis Enterprise Server Flexible enterprise-ready server deployment options The Pyxis Enterprise Server provides hospitals and health systems a scalable, flexible foundation for managing Pyxis ES platform
More informationThe Best Approach to Healthcare Analytics
Insights The Best Approach to Healthcare Analytics By Tom Burton Have you ever noticed the advertisements for The Best Doctors in America when reading the magazines in the seat back pocket while you re
More informationThe best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,
The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing
More informationDelivering ROI. The Case for an Output Management Solution for Hospitals
Delivering ROI The Case for an Output Management Solution for Hospitals The Case for an Output Management Solution for Hospitals Hospitals nationwide are facing financial pressures to improve efficiencies
More informationU.S. Air Force. AF Cyber Resiliency Office for Weapon Systems (CROWS) I n t e g r i t y - S e r v i c e - E x c e l l e n c e
U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Cyber Resiliency Office for Weapon Systems (CROWS) NDIA Systems Engineering Conference Mr. Danny Holtzman, HQE Cyber Technical
More informationOffice of Technology Transfer Overview
Office of Technology Transfer Overview Cluster Hire Faculty Orientation September 25, 2013 Kelly B. Sexton, Ph.D. Director North Carolina State University 2013 Impacts from NC State Technology Transfer
More informationAffordable quality software development outsourcing and nearshoring opportunities in 2017
Affordable quality software development outsourcing and nearshoring opportunities in 2017 Bulgarian Software House Your Тrusted Microsoft Partner 2017 page 1 15 + years experience in IT 30+ software developers
More informationBritish Columbia Innovation Council 2016/ /19 SERVICE PLAN
2016/17 2018/19 SERVICE PLAN For more information on the British Columbia Innovation Council contact: 9th floor - 1188 West Georgia Street Vancouver, BC V6E 4A2 Phone: 604-683-2724 Toll free: 1-800-665-7222
More information