Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Bug Bounty Programs - Successfully Controlling Complexity and Perpetual Temptation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Panel
- 3 Introductions
- 4 How Many Companies Have Bug Bounty Programs
- 5 First Payout for a Hacker
- 6 Types of Bug Bounty Programs
- 7 Limiting Your Scope
- 8 Starting Private
- 9 Static Code Analysis
- 10 Private Program
- 11 Private vs Public
- 12 Most Effective Control
- 13 Hybrids
- 14 Lifecycle
- 15 Global vs US
- 16 Poorly defined scope
- 17 Inhouse counsel
- 18 Product development
- 19 Legal IR
- 20 Vulnerability database
- 21 When researchers get paid
- 22 Paying upfront
- 23 Setting expectations
- 24 Signing up for bugs that dont promise to pay
- 25 Fixing security vulnerabilities
- 26 Consistency
- 27 Audience Question
- 28 Public vs Private Disclosure
- 29 Sharing
- 30 False Negatives
- 31 Benefits
- 32 Legal Risks
- 33 False Positive Rates
- 34 Transferring Findings
- 35 Payment Systems
- 36 Payment Frameworks
- 37 Ethical Behavior
- 38 Ban Everyone
- 39 Facebook Bounty
- 40 Bitcoin Bounty
- 41 Summary