Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 3 weeks ago | 59 mins Introduction aux programmes de bug bounty à destination des entreprises Baptiste Guichard - Enterprise Account Executive Le besoin d’une sécurité moderne et proactive n’a jamais été aussi important. Une méthode simple pour se protéger des cyber menaces consiste à inviter... 4 months ago | 25 mins Wanted Hacked or Patched: Bug Bounties for Third Party Open-Source libraries Chujiao Ma, Senior Security R&D Engineer, Comcast Open-source software components (OSCs) are used in commercial software development across a slew of industry sectors from communications to finance. B... 4 months ago | 33 mins Ask a Hacker in 2023 Joel Noguera, Douglas Day, Sean Melia, Jon Colston, and Chris Evans In this session, some of world’s top ethical hackers share everything you've ever wanted to know. Hear about their most exciting find, learn about the... February 23, 2023 4:00pm Insights from Intel's Bug Bounty Program Katie Noble, Director, PSIRT & Bug Bounty, Intel Kate Samaraev, Account Manager, Enterprise, HackerOne Hear how bug bounty plays a role in Intel's security posture and how insights from their program leads to more secure products. 12 months ago | 20 mins All Your Data Belongs to You Roy Davis, Zoom HackerOne has enhanced data visualization and analysis capabilities. For many bug bounty programs, the functionality available through the dashboards ... 2 months ago | 29 mins Adding a Bug Bounty Program to our Security Portfolio Security Panel: Ola Nordstrom and Christopher Vickery - Moderator: Pat Patterson Protection of the customer data entrusted to us is paramount. Yet daily, new threats arise and we employ a wide variety of tools and techniques to sta... 10 months ago | 44 mins Beyond the Bounty - The Real Value for Hackers & Organizations Laurie Mercer, Jacob Mattson, Baden Delamore, Katie Paxton-Fear HackerOne’s Laurie Mercer will be joined by Jacob Mattsson, Security Lead at online gaming company Kindred Group, who recently went public with their ... 8 months ago | 59 mins Crowdsourced Security and DevOps: A Few Things You Probably Didn't Know Kevin Hemmingsen Security and Trust Engineer at Bugcrowd, Jorge Orchilles Certified Instructor and Author at SANS Institute SANS and Bugcrowd recently partnered up for a webinar which explored the versatility of crowdsourced security and the bug bounty movement. During the... 8 months ago | 61 mins DBT Crowdsourced Security and DevOps: A Few Things You Probably Didn't Know Murtaza Hafizji, Sr. Cyber Security Strategist, Bugcrowd Crowdsourced security has its roots in the bug bounty movement, which emerged years ago. Since then, it's become much more versatile, enhancing numero... 7 months ago | 32 mins Load more