Главная
Study mode:
on
1
Introduction
2
Grant McCracken
3
Bug bounties
4
Why
5
Who
6
Value
7
Running a bug bounty
8
Offering rewards
9
Its you vs them
10
Step 0 Basic resources
11
Environment
12
Shared Environments
13
Access
14
Teamwork
15
After the program goes live
16
Summary
17
Speed
18
Good and bad reports
19
Rating taxonomy
20
Why rating taxonomy is important
21
Validation horror stories
22
Success stories
23
Conclusion
24
Question
25
Marketing
Description:
Explore the intricacies of running a bug bounty program in this 46-minute conference talk from AppSecEU 2016 in Rome. Delve into the reasons behind implementing bug bounties, their value, and the key players involved. Learn about offering rewards, setting up basic resources and environments, managing access, and fostering teamwork. Gain insights on handling the program post-launch, including the importance of speed, distinguishing between good and bad reports, and implementing a rating taxonomy. Discover validation horror stories and success stories, and understand the significance of marketing in bug bounty programs. Conclude with a Q&A session to address specific concerns and queries.

Running a Bug Bounty Program - What You Need to Know

OWASP Foundation
Add to list