Here is the Proposal Slides, here are the comments for each slide
1 – Greetings! Today we will be discussing why our proposal is beneficial to society. Today, we will be proposing our latest idea Bug Bounty Program. Before we begin, how often does everyone use their phones on a daily basis?
2 – Phones have become so integrated in our everyday lives. Whether we use it to text to a friend or a coworker, all of the information regarding the text is stored in our phone. This is one example that private information is being stored with protection. This is what cyber security has enabled us to do. However, any private information can be stolen at any given time from the exposure of cyber security. Cyber security is not perfect and still has many problems to this day.
3 – This is a serious issue plaguing many corporations in the current day
4 – There are many many more examples of this so it is a prevalent issue in current day society where many peoples information is secured behind cyberwalls.
5 – This program can be an effective way to combat malicious cyber security breaches with the intent of harm and theft.
7 – By hiring ethical hackers, their knowledge on exploits and loopholes can help Companies beef up their security system and to keep their technologies up to date. In return, the hackers can earn a living by doing a job that they are good at.
8 – This is an issue relating to current events, as a lot of communications are happening through apps like zoom
9 – Multiple companies such as Twitter, Netflix, and Dropbox has hired ethical hackers to help them test their security system, but the most notable ones are Facebook and Nintendo
10 – Often times, large companies will put up ads on websites such as Reddit, Twitter, Facebook, and YouTube to try to get recruits with a big reward at the end. These steps can be made easier by those companies going through our program instead. By sending us a request, we are able to provide them with one of our skilled members to test your security systems.
11 – To become a White Hat Hacker, our interview process will first prioritize someone with a bachelor degree in Computer Science or Information Technology. It is also recommended to have some IT- Certifications. To those who do not have a college degree, a proficient understanding of Java, C++, and Python, and networking could also help you land a spot on an interview. The interview most likely to conducted online since our organization will be worldwide. One of the benefit to working as a bug bounty hunter is that the time is very flexible.
12 – The cybersecurity program continues to be male dominated. According to “bugcrowd” 4% of the global hacking community are female.
13 – generates better results, reduces risks, and establishes organizations to release secure products to market faster
15 – On our website you can find more information to our company and even signup to become a white hat hacker yourself!