BSides Tallinn 2025

Allar Lauk

Allar Lauk is a Cybersecurity Engineer on the Product Security team at Bolt. Passionate about securing digital products, he focuses on integrating proactive security throughout the development lifecycle to protect Bolt's global users and diverse services.


Session

09-25
13:30
45min
Unleash the Crowd: Lessons from Building a Human Firewall
Allar Lauk

Are you feeling it...?

That relentless pressure as your attack surface expands – but your security resources just can’t keep up?

We’ve been there at Bolt, grappling with the exact same challenge. The relentless growth of digital assets, coupled with limited internal security resources has created critical blind spots and persistent exposure to threats. While our product security team excels at developing extensive and scalable security solutions, we often lack the capacity for the deep, narrow focus required by every application and service. Traditional penetration tests, while valuable for targeted assessments, by design provide a time-boxed and limited view, often leaving vast areas of the attack surface unexamined.

Enter crowdsourced security through bug bounty programs – a powerful, indispensable complement to Bolt’s existing defenses. Imagine leveraging a global, always-on network of ethical hackers, each bringing unique expertise and a fresh perspective. Unlike the constraints of traditional pentests, these skilled researchers aren't limited by scope or time. They can relentlessly delve into our features and services, uncovering subtle, systemic issues hidden deep within our systems. This collaborative, continuous approach doesn't just bridge the security resource gap; it dramatically reduces our window of exposure, transforming vulnerability management from a reactive burden into a proactive and resilient defense effort.

Join this session to uncover:
* Strategic Integration: How crowdsourced security has enhanced our overall vulnerability management framework?
* Real-World Triumphs & Challenges: Practical insights into the challenges and undeniable benefits of running a successful bug bounty program.
* Actionable Intelligence: How to transform raw bug findings into strategic insights that identify systemic weaknesses and inform the security roadmap?
* Unique Discoveries: Why crowdsourced findings often differ from, and complement, those from internal teams or traditional pentests?
* Program Playbook: Navigating the critical decision: Is a private or public bug bounty program the right fit for an organization?

Stage 2
Stage 2