Application Security , Governance & Risk Management , IT Risk Management

Evolving Your Security Strategy for the Challenges of 2022

Bugcrowd's Murtaza Hafizji on Taking a Risk-Based Approach to Changing Threats
Murtaza Hafizji, senior cybersecurity strategist, Bugcrowd

In today's dynamic threat environment, security teams must adopt a risk-based approach, prioritizing the most important areas of their organization. They also should not be afraid to seek outside help. Murtaza Hafizji of Bugcrowd discusses the merits of crowdsourced security.

See Also: OnDemand | Secure Your Vendor's Access from Attacks on Third-party Vulnerabilities

"We hear about the shortage of cybersecurity talent, and what crowdsourcing security does, as from Bugcrowd, we connect organizations to a network of security researchers that find vulnerabilities for organizations," Hafizji says. "So, really, opening that up and solving that cybersecurity shortage that organizations are facing today."

In this video interview with Information Security Media Group, Hafizji discusses:

  • The evolving threat landscape and expected trends;
  • The importance of adopting a risk-based approach;
  • The growth of crowdsourced security and how it works.

Hafizji loves to help Bugcrowd customers effectively address their toughest information security challenges. He has been in the cybersecurity industry over 12 years, loves to travel and has been to more than 26 countries and speaks five languages.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.