Главная
Study mode:
on
1
Intro
2
Macks Background
3
Plan for the Best Expect the Worst
4
Value of Partnering with Engineering and Development Teams
5
Mechanism for Communication
6
Maintaining a Good Program
7
Questions
8
Bonus Tips
9
Program Scope
10
Managing Entry
11
Rock Star
12
Which Researcher
13
Responsiveness
14
How do you respond to reports
15
How do you keep the program interesting
16
Questions for Mack
17
Starting a new program
18
Security training
19
Security training process
20
Wrap up
Description:
Discover best practices for building a world-class bug bounty program from Mack Staples, Senior Manager of Zenefits' Red Team. Learn how to protect sensitive customer data, including PII and PHI, through effective security strategies. Explore tips on partnering with engineering teams, establishing communication mechanisms, and maintaining program quality. Gain insights into program scope, managing entry, researcher selection, and responsiveness. Understand how to keep your program interesting and address common challenges. Get practical advice on starting a new program, implementing security training, and responding to reports. This 52-minute webinar, hosted by HackerOne, offers valuable knowledge for organizations looking to enhance their cybersecurity efforts through bug bounty initiatives.

Tips on Building a World-Class Bug Bounty Program - Zenefits Red Team Insights

HackerOne
Add to list