Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Fakta
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/) What is the successful formula for a bug bounty program? Should it be run internally, by a third party, or should you open it up to the public? Or, maybe a mixture of everything? Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, co-host Allan Alford (@allanalfordintx), and guest Justin Berman (@justinmberman), head of security, Dropbox. Thanks to this week's podcast sponsor, Cmd.
Cmd provides a lightweight platform for hardening production Linux. Small and large companies alike use Cmd to address auditing gaps, implement controls that keep DevOps safe, and trigger alerts on hard-to-find threats. With out-of-the-box policies that make setup easy, Cmd is leading the way in native protection of critical systems.
On this episode of Defense in Depth, you’ll learn: • Like red teaming, you need outside eyes looking at your environment and vulnerabilities. • There was much debate between internal, private, and public bug bounty programs. But it was agreed that if you do them, that you do them in that order. • There was another concern regarding the cost of a bug bounty program. Whether you do them or not, you're still going to pay for coding errors and vulnerabilities one way or another. It's either upfront or later. • Those new to bug bounty programs are not aware of the additional costs of management and engaging with the researchers and white hat hackers. That is a critical part of the bug bounty program. • Before you begin, set up a system to manage the flow of problems reported. If not, you and your staff could very quickly be overwhelmed. • Having a consistent and clear way you handle the findings is often more important than the findings. • Have you allocated budget to remediate the findings? Are you going to need to make cases as each weakness is found? • Keep in mind that companies don't go into bug bounty programs for the same reason. Some go into it for reasons of publicity or forming relationships with researchers. • Communications between your engineers and the bug bounty researchers is critical. If your team is non-responsive, the bug bounty program could backfire. • Most people are wary of public bug bounty programs because of the low signal-to-noise ratio. As there is a rush for attention and money, the whole effort may implode.
Release date
Lydbog: 28. maj 2020
Fakta
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/) What is the successful formula for a bug bounty program? Should it be run internally, by a third party, or should you open it up to the public? Or, maybe a mixture of everything? Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, co-host Allan Alford (@allanalfordintx), and guest Justin Berman (@justinmberman), head of security, Dropbox. Thanks to this week's podcast sponsor, Cmd.
Cmd provides a lightweight platform for hardening production Linux. Small and large companies alike use Cmd to address auditing gaps, implement controls that keep DevOps safe, and trigger alerts on hard-to-find threats. With out-of-the-box policies that make setup easy, Cmd is leading the way in native protection of critical systems.
On this episode of Defense in Depth, you’ll learn: • Like red teaming, you need outside eyes looking at your environment and vulnerabilities. • There was much debate between internal, private, and public bug bounty programs. But it was agreed that if you do them, that you do them in that order. • There was another concern regarding the cost of a bug bounty program. Whether you do them or not, you're still going to pay for coding errors and vulnerabilities one way or another. It's either upfront or later. • Those new to bug bounty programs are not aware of the additional costs of management and engaging with the researchers and white hat hackers. That is a critical part of the bug bounty program. • Before you begin, set up a system to manage the flow of problems reported. If not, you and your staff could very quickly be overwhelmed. • Having a consistent and clear way you handle the findings is often more important than the findings. • Have you allocated budget to remediate the findings? Are you going to need to make cases as each weakness is found? • Keep in mind that companies don't go into bug bounty programs for the same reason. Some go into it for reasons of publicity or forming relationships with researchers. • Communications between your engineers and the bug bounty researchers is critical. If your team is non-responsive, the bug bounty program could backfire. • Most people are wary of public bug bounty programs because of the low signal-to-noise ratio. As there is a rush for attention and money, the whole effort may implode.
Release date
Lydbog: 28. maj 2020
Dansk
Danmark