Главная
Study mode:
on
1
Introduction
2
Tactical Approach
3
Lightweight
4
Agile
5
Operational Excellence
6
Code Yellow
7
Authority Buyin
8
Application Assessments
9
Office Hours
10
Service Catalog
11
Product Review
12
Internal Assessments
13
Assessment Pitfalls
14
Missing the Big Picture
15
Application Incident Response
16
Critical Bugs
17
Handling Incoming Reports
18
Case Study Changing Faces
19
Bug Reporting
20
Push Code Fast
21
Cleanup
22
Taste Study
23
What We Found
24
Bug Severity Table
25
Communication
26
Example Email
27
Setting Expectations
28
Collaboration
29
Bug Bounty Programs
30
Case Study
31
How did we get to our program
32
Our private bug bounty program
33
Signaltonoise ratio
34
Impact on business
35
Signal to noise ratio
36
Key takeaways
37
Technology
Description:
Explore a provocative approach to application security in this Black Hat conference talk. Challenge conventional wisdom as the speakers advocate for a tactical, results-driven security program. Learn how to establish a lightweight yet effective team capable of conducting numerous assessments, handling bugs efficiently, and implementing a private bug bounty program within a year. Gain actionable advice for program managers and discover strategies for workers to drive change from within organizations. Examine the pros and cons of public bug bounty programs and understand why the speakers advise against them. Delve into topics such as operational excellence, application assessments, incident response, and effective communication strategies. Discover real-world case studies, practical examples, and key takeaways to improve your organization's security posture through a tactical, agile approach.

The Tactical Application Security Program - Getting Stuff Done

Black Hat
Add to list
0:00 / 0:00