Best Practices for Structuring Effective Bug Bounty Programs
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the world of bug bounty programs in this 55-minute conference talk from AppSecUSA 2016. Delve into the evolution, structure, and best practices of these valuable vulnerability identification tools. Learn about the Department of Defense's first authorized bug bounty program and how vendors are reevaluating their approach. Address key concerns such as controlling bug hunters, security and privacy issues, contractual matters, handling rogue hackers, and liability and compliance considerations. Gain insights from industry experts Jim Denaro and Casey Ellis as they discuss effective program structuring, offensive and defensive applications of intellectual property, and the scalability of bug bounty initiatives. Understand the rewards and risks associated with these programs, and discover how they're reshaping the landscape of cybersecurity.
Syllabus
Intro
Introductions
Outline
Shark analogy
The reward
The risk
Survey results
Bug bounty evolution
Scale
Brief
Scope
Budgeting
Legal
Rogue Hacking
Questions
Offensive vs Defensive
Trust
Taught by
OWASP Foundation
Related Courses
How to Build a StartupUdacity Copyright
Harvard University via edX Law and the Entrepreneur
Northwestern University via Coursera Innovation and Enterprise
Loughborough University via FutureLearn OpenKnowledge: Changing the global course of learning
Stanford University via Stanford OpenEdx