From Coordinated Disclosure to Cooperative Vulnerability Research When Dealing with Critical Software Stacks

From Coordinated Disclosure to Cooperative Vulnerability Research When Dealing with Critical Software Stacks

Black Hat via YouTube Direct link

Intro

1 of 31

1 of 31

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

From Coordinated Disclosure to Cooperative Vulnerability Research When Dealing with Critical Software Stacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Meet the Experts
  3. 3 The Disconnect
  4. 4 The Transition
  5. 5 Common Misconceptions
  6. 6 Cultural Divide
  7. 7 The Missing Links
  8. 8 Busybox Vulnerability
  9. 9 What can go wrong
  10. 10 My experience of bugs
  11. 11 Vendors response to disclosures
  12. 12 Developers perspective vs security perspective
  13. 13 We are still silent
  14. 14 Testing
  15. 15 Vulnerability Brokers
  16. 16 Normalize Vulnerability
  17. 17 Car Hacking
  18. 18 Incentives for Vendors
  19. 19 Vulnerability Research
  20. 20 Positivity
  21. 21 Customer perspective
  22. 22 Blue bounties
  23. 23 Working with vendors
  24. 24 Wall of fame for vendors
  25. 25 Whats the next step
  26. 26 Blue Bounty
  27. 27 Getting Vendors to Join
  28. 28 Github
  29. 29 Audience Questions
  30. 30 Coordinated Disclosure
  31. 31 Consumer Technology

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.