Completed
Consider the business impact!
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Tips for Running a Successful Bug Bounty Program
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Grant
- 3 Netscape "Bugs Bounty"
- 4 An (Abbreviated) History of Bug Bounties Since 1995
- 5 Do you really want to let people attack you?
- 6 Who are these people?
- 7 The Value of Crowdsourced Testing
- 8 Overview
- 9 But you never mentioned paying rewards!
- 10 Touch the code, pay the bug.
- 11 but first, Step 0
- 12 Scope
- 13 Focus
- 14 Exclusions
- 15 This is what a shared environment looks like...
- 16 Access
- 17 Manage Expectations
- 18 Communication is Key
- 19 Coordinated Disclosure
- 20 Define a Vulnerability Rating Taxonomy (VRT)
- 21 The Regular Methodologies
- 22 The Bughunter's Methodology
- 23 Consider the business impact!
- 24 Remember what it's all about.
- 25 Case Study: Instructure