Главная
Study mode:
on
1
Intro
2
AGENDA
3
WHAT WE'RE NOT COVERING
4
ORIGINS
5
MSVR ISN'T
6
MSVR ADVISORIES
7
WHY THE FOCUS ON THIRD PARTY
8
GOALS
9
WHO ARE FINDERS?
10
MSVR REQUIREMENTS
11
REPORT VULNERABILITY
12
MISFIRE: CLASSICO-DAY
13
ENSURE QUALITY
14
MISFIRE: NOT A BUG
15
CHECK FOR MICROSOFT IMPACT
16
MISFIRE: SALES PURGATORY
17
MONITOR
18
MISFIRE: SURPRISE!
19
SHIP UPDATE
20
MISFIRE: NO CREDIT
21
MSVR ADVISORY
22
CASE STUDY: LIBAVCODEC
23
CASE STUDY: VMWARE
24
CASE STUDY: BLACKBERRY PTG
25
LESSONS LEARNED
26
WHY YOU SHOULD RUN YOUR OWN MSVR
27
WHAT WE'D LIKE TO SEE WHEN REPORTING VULNERABILITIES
28
QUESTIONS?
29
CONTACT
Description:
Explore the intricacies of Microsoft's Vulnerability Research program in this conference talk from Notacon 11. Gain insights into the role of vulnerability finders within vendor organizations as Jeremy Brown and David Seidman delve into the origins, goals, and requirements of MSVR. Learn about the process of reporting vulnerabilities, ensuring quality, and monitoring for potential impacts on Microsoft products. Examine real-world case studies involving LibAVCodec, VMware, and BlackBerry, and discover valuable lessons for running your own MSVR program. Understand best practices for reporting vulnerabilities and get answers to common questions about this critical aspect of cybersecurity.

Microsoft Vulnerability Research: How to Be a Finder as a Vendor - Notacon 11

Add to list
0:00 / 0:00