Главная
Study mode:
on
1
Intro
2
About me
3
About the panelists
4
Scope of the bounty programs
5
Numbers and results
6
What is a bug bounty
7
What do you wish youd known before launching
8
How to forecast and plan both resourcing and budget
9
Understanding the value of a vulnerability
10
Communication is key
11
Mature OPSEC practice
12
Competition
13
Complementing Security
14
Silent Circle
15
Training
16
Private vs Public
17
Vendor Agreements
18
Bug Bounty Program
19
Disclosure
20
Balancing the Bounty
21
Tactical Resources
22
Team Structure
23
Handling lowquality bugs
24
Lowquality bugs
25
Respect your research
26
Technical risk vs business risk
27
How to get application teams engaged
28
Prioritize internally
29
Technical vs business risk
30
Reward
31
Out of Scope
32
Rewards
33
Scope
34
Charles
35
Patrick F
Description:
Explore the realities of bug bounty programs in this 51-minute Black Hat conference talk. Gain insights from experienced bounty managers as they discuss the impact on application security, signal-to-noise ratio, return on investment, and interactions with bounty hunters. Learn about crucial aspects like scoping, budgeting, vulnerability valuation, and effective communication. Discover the importance of mature operational security practices, competition dynamics, and how bug bounties complement existing security measures. Delve into topics such as private vs. public programs, vendor agreements, disclosure policies, and balancing rewards. Understand team structures, handling low-quality bug reports, and engaging application teams. Get practical advice on prioritizing internally, managing technical vs. business risk, and setting appropriate rewards and scope for your bug bounty program.

Fad or Future - Getting Past the Bug Bounty Hype

Black Hat
Add to list
0:00 / 0:00