Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=GdlHLt-zxDI



Duration: 53:29
5 views
0


Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
Jarek Stanley | Senior Program Manager, Microsoft
Shannon Sabens | Security Program Manager, Trend Micro
Greg Caswell | Application Security Team Lead, Indeed
Josh Jay | Application Security Lead, Major Film Studio
Location: Mandalay Bay CD
Date: Thursday, August 8 | 11:00am-11:50am
Format: 50-Minute Briefings
Track: Bug Bounty

Ever want to talk to someone that runs a bug bounty program and trade best practices and horror stories? Join this panel of bounty managers for real talk on signal vs noise, ROI, interacting with bounty hunters, and all the little things they wish they'd known before learning the hard way. Panelists will share strategies for day to day operations, triage strategies and scope setting, and chat about which vulnerability types are found most often and why they still end up in production code after over a decade of advances in security tooling and secure development practices.





Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-07Firmware Cartography: Charting the Course for Modern Server Compromise
2022-01-07API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
2022-01-07Fantastic Red-Team Attacks and How to Find Them
2022-01-07Arm IDA and Cross Check Reversing the Boeing 787's Core Network
2022-01-07Finding a Needle in an Encrypted Haystack: Detect the Most Prevalent Attacks on Active Directory
2022-01-07Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
2022-01-07Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
2022-01-07GDPArrrrr: Using Privacy Laws to Steal Identities
2022-01-07Finding Our Path: How We're Trying to Improve Active Directory Security
2022-01-07Ghidra - Journey from Classified NSA Tool to Open Source
2022-01-07Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
2022-01-07Attacking Electric Motors for Fun and Profit
2022-01-07Death to the IOC What's Next in Threat Intelligence
2022-01-07Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
2022-01-07Debug for Bug Crack and Hack Apple Core by Itself
2022-01-07Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
2022-01-07Breaking Encrypted Databases: Generic Attacks on Range Queries
2022-01-07Hacking Your Non Compete
2022-01-07Breaking Samsung's ARM TrustZone
2022-01-07Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller
2022-01-07No Royal Road … Notes on Dangerous Game



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
safety
theft
system
firewall
communication
privacy
binary
account
spy
program
spyware
hacked
conference
learn
how to
2022
cybersecurity
owned
break in
google
exploit
exploitation
recon
social engineering
Jarek Stanley
Shannon Sabens
Josh Jay
Greg Caswell