Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
Jarek Stanley | Senior Program Manager, Microsoft
Shannon Sabens | Security Program Manager, Trend Micro
Greg Caswell | Application Security Team Lead, Indeed
Josh Jay | Application Security Lead, Major Film Studio
Location: Mandalay Bay CD
Date: Thursday, August 8 | 11:00am-11:50am
Format: 50-Minute Briefings
Track: Bug Bounty
Ever want to talk to someone that runs a bug bounty program and trade best practices and horror stories? Join this panel of bounty managers for real talk on signal vs noise, ROI, interacting with bounty hunters, and all the little things they wish they'd known before learning the hard way. Panelists will share strategies for day to day operations, triage strategies and scope setting, and chat about which vulnerability types are found most often and why they still end up in production code after over a decade of advances in security tooling and secure development practices.
Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security