Overview
Syllabus
Intro
A bit about me
The Nature of Disclosure
Rain Forest Policy (RFPolicy)
The Trustworthy Computing Memo
Disclosure Drives Action
Remember Netscape?
Vendor Agnostic Bounty Programs
How vendor agnostic bounties work
Bug Bounty as a Service (BBaaS)
Evolving Marketplace
Exploit Intelligence Marketplace
Economy in Action
Lessons from Hacking Team Leak
How to Get Oday: Vulnerability Brokers
Bounty Programs Killing Exploits
Beyond Just Security Patches
Living in the Shadow Brokers Reality
Killing NSA's Tailored Access Operation exploits
Shades of Stuxnet
Killing CIA's Closed Network Infiltration Tool
Pwn2own Inspired Improvements
Benefits to Researchers
Conclusion