Cybersecurity

Pentagon names firms to run bug bounty program

Shutterstock image.

The Defense Department is making the pursuit of cybersecurity vulnerabilities easier for the armed services through a new contracting effort.

DOD officials want to harness the crowdsourced "Hack the Pentagon" pilot program unveiled in March for its many component operations. DOD partnered with HackerOne, a bug-bounty-as-a-service firm based in Silicon Valley, to run the pilot.

It ran from April 18 to May 12 and focused on several of DOD’s public-facing websites. It generated 1,189 vulnerability reports from more than 1,400 participants. At the ceremony noting the success of the program in June, Defense Secretary Ash Carter directed all DOD components and military services to review where bug bounty programs could be used.

Carter also said DOD would incorporate incentives into its acquisition policies to encourage contractors to take innovative approaches to cybersecurity testing.

On Oct. 20, Pentagon officials announced a contracting effort to make those crowdsourced bug bounty capabilities available in a flexible manner.

DOD tapped HackerOne and Synack to create a new contract vehicle for DOD components that will allow them to launch their own bug bounty challenges, with the ultimate goal being to normalize the crowdsourced approach to digital defenses.

Additionally, DOD is restructuring its headquarters to save $1.9 billion in costs, and the new contracting initiatives can help with that effort, officials said.

"These contract vehicles will create an easier and faster path for components and services to set up their own challenges," said Lisa Wiswell, bureaucracy hacker at the Defense Digital Service, in the DOD statement. "Considering the tremendous cost benefit of crowdsourcing talent, it's proven that you'll get more bang for your buck than with some of the other traditional security tools we've used in the past."

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.