Attracting the Hacker -- Bug Bounty and Coordinated Vulnerability Disclosure

Logo
Presented by

Julia Hermann, Information Security Architect, Giesecke+Devrient GmbH

About this talk

In the past, IT was driving the tools for the business. Today, “the IT” no longer exists. Tools are selected and implemented by business users. The main driver is digital transformation supported by widespread, cheap and ubiquitous technology. At the same time traditional security also is being “digitally transformed” as these new landscapes also expand cyberspace attack surfaces. Ideally, companies have a well-established cyber defense; in reality, they are often reactive, slow and provide limited visibility of the attack surface, allowing hackers to be that one step ahead. That’s why companies should turn the tables and pay these hackers to challenge the security surrounding products and services. A bug bounty program supports this by opening a path for them to legally monetize their findings. Learning objectives: 1. Understand the benefits of including bug bounty programs into the vulnerability management process. 2. Explain to senior management why inviting hackers to ""challenge"" a company's products and services is not a risk but a chance. 3. Understand the requirements and challenges to set up a bug bounty program.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (107)
Subscribers (21196)
(ISC)² Security Congress channel contains digital content of activities at (ISC)2's Flagship conference event. You'll find keynotes, sessions and related items.