CJ OliveNetworks, in collaboration with the Korea Internet & Security Agency (KISA) and security startup "Find the Gap," is actively seeking small and medium-sized companies as well as ethical hackers to take part in the "White Hat Together" initiative.
The primary goal of "White Hat Together" is to enhance the security capabilities of small and medium-sized enterprises by offering free security consulting, solutions, and training services.
CJ OliveNetworks has been running the "CJ White Hat" social contribution program since 2020, providing complimentary tailored consulting services to SMEs, including simulated hacking exercises, compliance inspections for personal information protection, and training in information security.
Leveraging its extensive experience in security consulting, the company has decided to collaborate with KISA and Finder Gap to elevate this program to new heights.
Under this partnership, CJ OliveNetworks is responsible for the overall planning and operation of the program, while the Korea Internet & Security Agency designs the "Bug Bounty Program: Finding A White Hacker," delivers "Security as a Service (SECaaS)," and offers rewards to participants. "Find the Gap" serves as the platform for the competition and provides mentoring to university students.
This year, the support scale will be expanded, and a wider range of programs will be offered. To ensure more companies can benefit, the support has been extended to include small and medium-sized enterprises, and the number of selected companies has been increased to a maximum of 50, up from the previous 20.
Small and medium-sized businesses interested in participating in "White Hat Together" can apply through the application form on the main page of the open innovation platform "hubpot" until July 7.
All IT-based service providers, such as those involved in website development, mobile app development, and client software development, are eligible to apply.
Participating companies will have the opportunity to choose between engaging in the Bug Bounty Program, receiving information protection consulting, consulting services, or utilizing Security as a Service (SECaaS), based on their specific needs.