Critical Vulnerabilities and Bug Bounty Programs
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Agenda
Disclaimer
Google VRP
Google Bounty Program
Google Researcher Location Data
Facebook Bounty Program
Facebook 2014 Report
GitHub Bug Bounty
Microsoft Bug Bounty
Microsoft Online Services Bounty
Acknowledgements
Different Bounty Models
Bounty Data
Customers
Submissions
Rewards
High Priority Critical
Who is finding these bugs
Submissions by geography
Google
Facebook
Delete Photos
Simple Simple
Smartsheet
Import User Bug
Upload Import Bug
Tesla Bug Bounty
Authentication Bypass Bug
Submission Framework Expectations
Other Companies
Other Resources
Out Of Scope
Direct Performance Feedback
Rapid triage prioritization
LastPass prioritization
Is it worth it
SLA
Stop rewarding bad behavior
Reward consistently
Conclusions
Call To Action
Question Time
Taught by
Black Hat
Related Courses
Inspiring and Motivating IndividualsUniversity of Michigan via Coursera Managing Social and Human Capital
University of Pennsylvania via Coursera Inspiring and Motivating Arts and Culture Teams
University of Michigan via edX Management Fundamentals
University of Pennsylvania via Coursera Strategic Performance Management
Indian Institute of Technology, Kharagpur via Swayam