YoVDO

Microsoft Vulnerability Research: How to Be a Finder as a Vendor - Notacon 11

Offered By: YouTube

Tags

Vulnerability Research Courses Cybersecurity Courses Software Security Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Microsoft's Vulnerability Research program in this conference talk from Notacon 11. Gain insights into the role of vulnerability finders within vendor organizations as Jeremy Brown and David Seidman delve into the origins, goals, and requirements of MSVR. Learn about the process of reporting vulnerabilities, ensuring quality, and monitoring for potential impacts on Microsoft products. Examine real-world case studies involving LibAVCodec, VMware, and BlackBerry, and discover valuable lessons for running your own MSVR program. Understand best practices for reporting vulnerabilities and get answers to common questions about this critical aspect of cybersecurity.

Syllabus

Intro
AGENDA
WHAT WE'RE NOT COVERING
ORIGINS
MSVR ISN'T
MSVR ADVISORIES
WHY THE FOCUS ON THIRD PARTY
GOALS
WHO ARE FINDERS?
MSVR REQUIREMENTS
REPORT VULNERABILITY
MISFIRE: CLASSICO-DAY
ENSURE QUALITY
MISFIRE: NOT A BUG
CHECK FOR MICROSOFT IMPACT
MISFIRE: SALES PURGATORY
MONITOR
MISFIRE: SURPRISE!
SHIP UPDATE
MISFIRE: NO CREDIT
MSVR ADVISORY
CASE STUDY: LIBAVCODEC
CASE STUDY: VMWARE
CASE STUDY: BLACKBERRY PTG
LESSONS LEARNED
WHY YOU SHOULD RUN YOUR OWN MSVR
WHAT WE'D LIKE TO SEE WHEN REPORTING VULNERABILITIES
QUESTIONS?
CONTACT


Related Courses

The Foundations of Cybersecurity
University System of Georgia via Coursera
Introduction to Cybersecurity
SecurityScoreCard via Udacity
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Fundamentals of Internet Security | Secure Your Environment
Udemy
Ciberseguridad en linea
Udemy