Главная
Study mode:
on
1
Intro
2
Katies background
3
Organizational empathy
4
Bug bounties
5
Bounties vs penetration testing
6
Vulnerability response
7
Beautiful
8
Goals
9
Three Bounties
10
Bug Reporting Trends
11
Giant Check
12
Total Price
13
Market Timing
14
Wrap Up
15
Getting Started
16
Application Security Program
17
Initial Spike
18
Trends
19
Goals and Ways
20
Where does vulnerability information feed back
21
CFAA
22
QA
Description:
Explore the world of bug bounties and their role in the Software Development Life Cycle (SDLC) in this keynote address from OWASP AppSec California 2015. Dive into Katie Moussouris' extensive background and insights on organizational empathy, the differences between bug bounties and penetration testing, and effective vulnerability response strategies. Learn about the three types of bounties, bug reporting trends, and the importance of market timing in bounty programs. Gain valuable knowledge on starting and maintaining an application security program, understanding initial spikes in vulnerability reports, and navigating the legal landscape surrounding the Computer Fraud and Abuse Act (CFAA). Discover how vulnerability information feeds back into the development process and get answers to common questions in the Q&A session.

Bounties and the Software Development Life Cycle

OWASP Foundation
Add to list
0:00 / 0:00