Completed
Merakis program
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
5 Tips and Tricks for Running a Successful Bug Bounty Program
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Cybersecurity Struggles
- 4 Why Crowdsourcing
- 5 Benefits
- 6 How does it work
- 7 Two different ways
- 8 Merakis program
- 9 Tip 1 Get buyin early
- 10 Tip 2 Own your program
- 11 Tip 3 Scope and rewards
- 12 Tip 4 Expectations
- 13 Tip 5 Planning
- 14 Closing Comments
- 15 QA vs Production
- 16 Context Matters
- 17 Dont Run the Risk
- 18 Easter Eggs
- 19 Vulnerability Validation
- 20 Clarification
- 21 Webinar function
- 22 Service offerings
- 23 Requirements
- 24 Lump Sum
- 25 Capacity to Participate
- 26 Crowdsource Security Program
- 27 Vulnerability Disclosure Programs
- 28 Outro