Chester Wisniewski is a principal research scientist at next-generation security leader Sophos. With more than 20 years of professional experience, his interest in security and privacy first peaked while learning to hack from bulletin board text files in the 1980s, and has since been a lifelong pursuit.
Chester analyzes the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviors and effective security defenses. He’s helped organizations design enterprise-scale defense strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands.
Based in Vancouver, Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He’s widely recognized as one of the industry’s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.
When not busy fighting cybercrime, Chester spends his free time cooking, cycling, and mentoring new entrants to the security field through his volunteer work with InfoSec BC. Chester is available on Twitter (@chetwisniewski) and can be reached via email at email@example.com.
This is the third article in a series on the phenomenon of “beg bounty” hunters. The first two articles consider what it is, why people do it, and how. This one details the experience of one particular target.
I recently wrote a Sophos News article on the whole phenomenon of “beg bounties” and invited organizations that had been affected to get in touch. Many did and some had amazing stories to tell. In this article I will explain what I learned about why people become beg bounty hunters and how they approach it. A further article will detail the experience of one particular target.