ºÝºÝߣshows by User: bugcrowd / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: bugcrowd / Wed, 25 Dec 2019 14:11:17 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: bugcrowd Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel /slideshow/bug-bounties-ransomware-and-other-cyber-hype-for-legal-counsel/210407433 bounties-ransomware-and-other-cyber-hype-191225141117
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel MCCA Global TEC Forum April 13, 2018]]>

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel MCCA Global TEC Forum April 13, 2018]]>
Wed, 25 Dec 2019 14:11:17 GMT /slideshow/bug-bounties-ransomware-and-other-cyber-hype-for-legal-counsel/210407433 bugcrowd@slideshare.net(bugcrowd) Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel bugcrowd Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel MCCA Global TEC Forum April 13, 2018 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bounties-ransomware-and-other-cyber-hype-191225141117-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel MCCA Global TEC Forum April 13, 2018
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel from bugcrowd
]]>
1022 1 https://cdn.slidesharecdn.com/ss_thumbnails/bounties-ransomware-and-other-cyber-hype-191225141117-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ekoparty 2017 - The Bug Hunter's Methodology /slideshow/ekoparty-2017-the-bug-hunters-methodology/80270076 thebughuntersmethodology-170928211328
Goals of this Presentation: - Outline and provide an actionable methodology for effectively and efficiently testing for, and finding security vulnerabilities in web applications - Cover common vulnerability classes/types/categories from a high level - Provide useful tools and processes that you can take right out into the world to immediately improve your own bug hunting abilities]]>

Goals of this Presentation: - Outline and provide an actionable methodology for effectively and efficiently testing for, and finding security vulnerabilities in web applications - Cover common vulnerability classes/types/categories from a high level - Provide useful tools and processes that you can take right out into the world to immediately improve your own bug hunting abilities]]>
Thu, 28 Sep 2017 21:13:28 GMT /slideshow/ekoparty-2017-the-bug-hunters-methodology/80270076 bugcrowd@slideshare.net(bugcrowd) Ekoparty 2017 - The Bug Hunter's Methodology bugcrowd Goals of this Presentation: - Outline and provide an actionable methodology for effectively and efficiently testing for, and finding security vulnerabilities in web applications - Cover common vulnerability classes/types/categories from a high level - Provide useful tools and processes that you can take right out into the world to immediately improve your own bug hunting abilities <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thebughuntersmethodology-170928211328-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Goals of this Presentation: - Outline and provide an actionable methodology for effectively and efficiently testing for, and finding security vulnerabilities in web applications - Cover common vulnerability classes/types/categories from a high level - Provide useful tools and processes that you can take right out into the world to immediately improve your own bug hunting abilities
Ekoparty 2017 - The Bug Hunter's Methodology from bugcrowd
]]>
8137 10 https://cdn.slidesharecdn.com/ss_thumbnails/thebughuntersmethodology-170928211328-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program /bugcrowd/3-reasons-to-swap-your-next-pen-test-with-a-bug-bounty-program instructurebugcrowdwebinar-170428183307
This webcast will analyze the key differences between the penetration testing and bug bounty models and explore why one company replaced their pen tests over the last three years.]]>

This webcast will analyze the key differences between the penetration testing and bug bounty models and explore why one company replaced their pen tests over the last three years.]]>
Fri, 28 Apr 2017 18:33:07 GMT /bugcrowd/3-reasons-to-swap-your-next-pen-test-with-a-bug-bounty-program bugcrowd@slideshare.net(bugcrowd) 3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program bugcrowd This webcast will analyze the key differences between the penetration testing and bug bounty models and explore why one company replaced their pen tests over the last three years. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/instructurebugcrowdwebinar-170428183307-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This webcast will analyze the key differences between the penetration testing and bug bounty models and explore why one company replaced their pen tests over the last three years.
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program from bugcrowd
]]>
1506 5 https://cdn.slidesharecdn.com/ss_thumbnails/instructurebugcrowdwebinar-170428183307-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
7 Bug Bounty Myths, BUSTED /slideshow/7-bug-bounty-mythsbusted/70323727 7bugbountymythsbusted-161221024843
View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar About the content: Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world. After viewing this presentation and ondemand webinar you will: 1. Learn if a bug bounty program is right for your organization 2. Understand if a bug bounty encourages hackers to attack your systems 3. Explore the real benefits of bug bounty programs – and find out if they actually work 4. Get insight on whether these programs are too hard and costly to manage]]>

View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar About the content: Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world. After viewing this presentation and ondemand webinar you will: 1. Learn if a bug bounty program is right for your organization 2. Understand if a bug bounty encourages hackers to attack your systems 3. Explore the real benefits of bug bounty programs – and find out if they actually work 4. Get insight on whether these programs are too hard and costly to manage]]>
Wed, 21 Dec 2016 02:48:43 GMT /slideshow/7-bug-bounty-mythsbusted/70323727 bugcrowd@slideshare.net(bugcrowd) 7 Bug Bounty Myths, BUSTED bugcrowd View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar About the content: Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world. After viewing this presentation and ondemand webinar you will: 1. Learn if a bug bounty program is right for your organization 2. Understand if a bug bounty encourages hackers to attack your systems 3. Explore the real benefits of bug bounty programs – and find out if they actually work 4. Get insight on whether these programs are too hard and costly to manage <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7bugbountymythsbusted-161221024843-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar About the content: Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world. After viewing this presentation and ondemand webinar you will: 1. Learn if a bug bounty program is right for your organization 2. Understand if a bug bounty encourages hackers to attack your systems 3. Explore the real benefits of bug bounty programs – and find out if they actually work 4. Get insight on whether these programs are too hard and costly to manage
7 Bug Bounty Myths, BUSTED from bugcrowd
]]>
725 5 https://cdn.slidesharecdn.com/ss_thumbnails/7bugbountymythsbusted-161221024843-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
If You Can't Beat 'Em, Join 'Em (AppSecUSA) /slideshow/if-you-cant-beat-em-join-em-appsecusa/67193218 ifyoucantbeatemjoinemgrantmccrackendanieltrauner-161014185133
Grant McCracken and Daniel Trauner's presentation on setting up and managing a successful bug bounty program. Having a bug bounty program is one of the most efficient methods of finding security vulnerabilities today. But, as anyone who has tried to run a bug bounty program knows, it's not a trivial undertaking... As professionals who have helped to manage hundreds of bug bounty programs, we're uniquely positioned to provide advice on how to succeed. Whether you're already running a bug bounty program, are looking to run a bug bounty program, or are a researcher, this talk aims to deepen your knowledge of the subject.]]>

Grant McCracken and Daniel Trauner's presentation on setting up and managing a successful bug bounty program. Having a bug bounty program is one of the most efficient methods of finding security vulnerabilities today. But, as anyone who has tried to run a bug bounty program knows, it's not a trivial undertaking... As professionals who have helped to manage hundreds of bug bounty programs, we're uniquely positioned to provide advice on how to succeed. Whether you're already running a bug bounty program, are looking to run a bug bounty program, or are a researcher, this talk aims to deepen your knowledge of the subject.]]>
Fri, 14 Oct 2016 18:51:32 GMT /slideshow/if-you-cant-beat-em-join-em-appsecusa/67193218 bugcrowd@slideshare.net(bugcrowd) If You Can't Beat 'Em, Join 'Em (AppSecUSA) bugcrowd Grant McCracken and Daniel Trauner's presentation on setting up and managing a successful bug bounty program. Having a bug bounty program is one of the most efficient methods of finding security vulnerabilities today. But, as anyone who has tried to run a bug bounty program knows, it's not a trivial undertaking... As professionals who have helped to manage hundreds of bug bounty programs, we're uniquely positioned to provide advice on how to succeed. Whether you're already running a bug bounty program, are looking to run a bug bounty program, or are a researcher, this talk aims to deepen your knowledge of the subject. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ifyoucantbeatemjoinemgrantmccrackendanieltrauner-161014185133-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Grant McCracken and Daniel Trauner&#39;s presentation on setting up and managing a successful bug bounty program. Having a bug bounty program is one of the most efficient methods of finding security vulnerabilities today. But, as anyone who has tried to run a bug bounty program knows, it&#39;s not a trivial undertaking... As professionals who have helped to manage hundreds of bug bounty programs, we&#39;re uniquely positioned to provide advice on how to succeed. Whether you&#39;re already running a bug bounty program, are looking to run a bug bounty program, or are a researcher, this talk aims to deepen your knowledge of the subject.
If You Can't Beat 'Em, Join 'Em (AppSecUSA) from bugcrowd
]]>
644 5 https://cdn.slidesharecdn.com/ss_thumbnails/ifyoucantbeatemjoinemgrantmccrackendanieltrauner-161014185133-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AppSecUSA 2016: 'Your License for Bug Hunting Season' /slideshow/appsecusa-2016-your-license-for-bug-hunting-season/67130222 your-license-for-bug-hunting-season-161013144535
You don’t need a license for bug hunting season anymore. Bug bounty programs are becoming well established as a valuable tool in identifying vulnerabilities early. The Department of Defense has authorized its first bug bounty program, and many vendors are taking a fresh look. While the programs are highly effective, many questions remain about how to structure bug bounty programs to address the concerns that vendors and researchers have about controlling bug hunters, security and privacy, contractual issues with bug hunters, what happens if there is a rogue hacker in the crowd, and liability and compliance concerns. This presentation will cover the best practices for structuring effective bug bounty programs. Talk originally given at AppSecUSA 2016 | October 13, 2016]]>

You don’t need a license for bug hunting season anymore. Bug bounty programs are becoming well established as a valuable tool in identifying vulnerabilities early. The Department of Defense has authorized its first bug bounty program, and many vendors are taking a fresh look. While the programs are highly effective, many questions remain about how to structure bug bounty programs to address the concerns that vendors and researchers have about controlling bug hunters, security and privacy, contractual issues with bug hunters, what happens if there is a rogue hacker in the crowd, and liability and compliance concerns. This presentation will cover the best practices for structuring effective bug bounty programs. Talk originally given at AppSecUSA 2016 | October 13, 2016]]>
Thu, 13 Oct 2016 14:45:35 GMT /slideshow/appsecusa-2016-your-license-for-bug-hunting-season/67130222 bugcrowd@slideshare.net(bugcrowd) AppSecUSA 2016: 'Your License for Bug Hunting Season' bugcrowd You don’t need a license for bug hunting season anymore. Bug bounty programs are becoming well established as a valuable tool in identifying vulnerabilities early. The Department of Defense has authorized its first bug bounty program, and many vendors are taking a fresh look. While the programs are highly effective, many questions remain about how to structure bug bounty programs to address the concerns that vendors and researchers have about controlling bug hunters, security and privacy, contractual issues with bug hunters, what happens if there is a rogue hacker in the crowd, and liability and compliance concerns. This presentation will cover the best practices for structuring effective bug bounty programs. Talk originally given at AppSecUSA 2016 | October 13, 2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/your-license-for-bug-hunting-season-161013144535-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> You don’t need a license for bug hunting season anymore. Bug bounty programs are becoming well established as a valuable tool in identifying vulnerabilities early. The Department of Defense has authorized its first bug bounty program, and many vendors are taking a fresh look. While the programs are highly effective, many questions remain about how to structure bug bounty programs to address the concerns that vendors and researchers have about controlling bug hunters, security and privacy, contractual issues with bug hunters, what happens if there is a rogue hacker in the crowd, and liability and compliance concerns. This presentation will cover the best practices for structuring effective bug bounty programs. Talk originally given at AppSecUSA 2016 | October 13, 2016
AppSecUSA 2016: 'Your License for Bug Hunting Season' from bugcrowd
]]>
953 5 https://cdn.slidesharecdn.com/ss_thumbnails/your-license-for-bug-hunting-season-161013144535-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bug Bounty Tipping Point: Strength in Numbers /slideshow/bug-bounty-tipping-point-strength-in-numbers/66266833 bugbountytippingpointwebcast-160921163216
Recorded on September 21, 2016, Casey Ellis, Bugcrowd CEO and Kymberlee Price, Sr. Director of Researcher Operations, explore current trends in the bug bounty market.]]>

Recorded on September 21, 2016, Casey Ellis, Bugcrowd CEO and Kymberlee Price, Sr. Director of Researcher Operations, explore current trends in the bug bounty market.]]>
Wed, 21 Sep 2016 16:32:16 GMT /slideshow/bug-bounty-tipping-point-strength-in-numbers/66266833 bugcrowd@slideshare.net(bugcrowd) Bug Bounty Tipping Point: Strength in Numbers bugcrowd Recorded on September 21, 2016, Casey Ellis, Bugcrowd CEO and Kymberlee Price, Sr. Director of Researcher Operations, explore current trends in the bug bounty market. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bugbountytippingpointwebcast-160921163216-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Recorded on September 21, 2016, Casey Ellis, Bugcrowd CEO and Kymberlee Price, Sr. Director of Researcher Operations, explore current trends in the bug bounty market.
Bug Bounty Tipping Point: Strength in Numbers from bugcrowd
]]>
798 6 https://cdn.slidesharecdn.com/ss_thumbnails/bugbountytippingpointwebcast-160921163216-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[Webinar] Building a Product Security Incident Response Team: Learnings from the Hivemind /slideshow/webinar-building-a-product-security-incident-response-team-learnings-from-the-hivemind/64944445 us-16-price-building-a-product-security-incident-response-team-learnings-from-the-hivemind-160812153709
Kymberlee Price's Black Hat 2016 talk in a live webcast. This presentation will address some best practices and templates to help security teams build or scale their incident response practices.]]>

Kymberlee Price's Black Hat 2016 talk in a live webcast. This presentation will address some best practices and templates to help security teams build or scale their incident response practices.]]>
Fri, 12 Aug 2016 15:37:09 GMT /slideshow/webinar-building-a-product-security-incident-response-team-learnings-from-the-hivemind/64944445 bugcrowd@slideshare.net(bugcrowd) [Webinar] Building a Product Security Incident Response Team: Learnings from the Hivemind bugcrowd Kymberlee Price's Black Hat 2016 talk in a live webcast. This presentation will address some best practices and templates to help security teams build or scale their incident response practices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/us-16-price-building-a-product-security-incident-response-team-learnings-from-the-hivemind-160812153709-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Kymberlee Price&#39;s Black Hat 2016 talk in a live webcast. This presentation will address some best practices and templates to help security teams build or scale their incident response practices.
[Webinar] Building a Product Security Incident Response Team: Learnings from the Hivemind from bugcrowd
]]>
939 4 https://cdn.slidesharecdn.com/ss_thumbnails/us-16-price-building-a-product-security-incident-response-team-learnings-from-the-hivemind-160812153709-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
If You Can't Beat 'Em, Join 'Em /slideshow/if-you-cant-beat-em-join-em/60353445 ifyoucantbeatemjoinem-bsidesaustingrantdan-160401190336
Grant Mccracken and Daniel Trauner give tips for running a successful bug bounty program. From writing a clear bounty brief, to communicating efficiently and effectively with researchers, this presentation, given originally at BSides Austin on April 1, 2016, is a great first step in thinking about running a bug bounty program.]]>

Grant Mccracken and Daniel Trauner give tips for running a successful bug bounty program. From writing a clear bounty brief, to communicating efficiently and effectively with researchers, this presentation, given originally at BSides Austin on April 1, 2016, is a great first step in thinking about running a bug bounty program.]]>
Fri, 01 Apr 2016 19:03:36 GMT /slideshow/if-you-cant-beat-em-join-em/60353445 bugcrowd@slideshare.net(bugcrowd) If You Can't Beat 'Em, Join 'Em bugcrowd Grant Mccracken and Daniel Trauner give tips for running a successful bug bounty program. From writing a clear bounty brief, to communicating efficiently and effectively with researchers, this presentation, given originally at BSides Austin on April 1, 2016, is a great first step in thinking about running a bug bounty program. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ifyoucantbeatemjoinem-bsidesaustingrantdan-160401190336-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Grant Mccracken and Daniel Trauner give tips for running a successful bug bounty program. From writing a clear bounty brief, to communicating efficiently and effectively with researchers, this presentation, given originally at BSides Austin on April 1, 2016, is a great first step in thinking about running a bug bounty program.
If You Can't Beat 'Em, Join 'Em from bugcrowd
]]>
1042 10 https://cdn.slidesharecdn.com/ss_thumbnails/ifyoucantbeatemjoinem-bsidesaustingrantdan-160401190336-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Writing vuln reports that maximize payouts - Nullcon 2016 /slideshow/writing-vuln-reports-that-maximize-payouts-nullcon-2016/59513840 writingvulnreportsthatmaximizepayouts-160314054436
Writing Vuln Submissions that Maximize Your Payouts - presentation given at Nullcon 2016 by Bugcrowd's Kymberlee Price. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd]]>

Writing Vuln Submissions that Maximize Your Payouts - presentation given at Nullcon 2016 by Bugcrowd's Kymberlee Price. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd]]>
Mon, 14 Mar 2016 05:44:36 GMT /slideshow/writing-vuln-reports-that-maximize-payouts-nullcon-2016/59513840 bugcrowd@slideshare.net(bugcrowd) Writing vuln reports that maximize payouts - Nullcon 2016 bugcrowd Writing Vuln Submissions that Maximize Your Payouts - presentation given at Nullcon 2016 by Bugcrowd's Kymberlee Price. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/writingvulnreportsthatmaximizepayouts-160314054436-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Writing Vuln Submissions that Maximize Your Payouts - presentation given at Nullcon 2016 by Bugcrowd&#39;s Kymberlee Price. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd
Writing vuln reports that maximize payouts - Nullcon 2016 from bugcrowd
]]>
2906 8 https://cdn.slidesharecdn.com/ss_thumbnails/writingvulnreportsthatmaximizepayouts-160314054436-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bug Bounty Hunter Methodology - Nullcon 2016 /slideshow/bug-bounty-hunter-methodology-nullcon-2016/59513604 nullc0nbountyhuntingtechniques-160314053844
This is a bug bounty hunter presentation given at Nullcon 2016 by Bugcrowd's Faraz Khan. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd]]>

This is a bug bounty hunter presentation given at Nullcon 2016 by Bugcrowd's Faraz Khan. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd]]>
Mon, 14 Mar 2016 05:38:44 GMT /slideshow/bug-bounty-hunter-methodology-nullcon-2016/59513604 bugcrowd@slideshare.net(bugcrowd) Bug Bounty Hunter Methodology - Nullcon 2016 bugcrowd This is a bug bounty hunter presentation given at Nullcon 2016 by Bugcrowd's Faraz Khan. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullc0nbountyhuntingtechniques-160314053844-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a bug bounty hunter presentation given at Nullcon 2016 by Bugcrowd&#39;s Faraz Khan. Learn more about Bugcrowd here: https://bugcrowd.com/join-the-crowd
Bug Bounty Hunter Methodology - Nullcon 2016 from bugcrowd
]]>
12625 16 https://cdn.slidesharecdn.com/ss_thumbnails/nullc0nbountyhuntingtechniques-160314053844-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Revitalizing Product Securtiy at Zephyr Health /slideshow/revitalizing-product-securtiy-at-zephyr-health/53030494 zephyrhealthslidesnotes-150921184903-lva1-app6892
Zephyr Health, a quickly growing company harnessing the power of global healthcare data, has spent the last year augmenting its’ product security efforts. With Bugcrowd’s help, they have transformed their development and overarching culture to prioritize security. Bugcrowd joins Zephyr Health’s CISO, Kim Green, to hear about how she came to understand and implement crowdsourced security testing within the organization. ]]>

Zephyr Health, a quickly growing company harnessing the power of global healthcare data, has spent the last year augmenting its’ product security efforts. With Bugcrowd’s help, they have transformed their development and overarching culture to prioritize security. Bugcrowd joins Zephyr Health’s CISO, Kim Green, to hear about how she came to understand and implement crowdsourced security testing within the organization. ]]>
Mon, 21 Sep 2015 18:49:02 GMT /slideshow/revitalizing-product-securtiy-at-zephyr-health/53030494 bugcrowd@slideshare.net(bugcrowd) Revitalizing Product Securtiy at Zephyr Health bugcrowd Zephyr Health, a quickly growing company harnessing the power of global healthcare data, has spent the last year augmenting its’ product security efforts. With Bugcrowd’s help, they have transformed their development and overarching culture to prioritize security. Bugcrowd joins Zephyr Health’s CISO, Kim Green, to hear about how she came to understand and implement crowdsourced security testing within the organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zephyrhealthslidesnotes-150921184903-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Zephyr Health, a quickly growing company harnessing the power of global healthcare data, has spent the last year augmenting its’ product security efforts. With Bugcrowd’s help, they have transformed their development and overarching culture to prioritize security. Bugcrowd joins Zephyr Health’s CISO, Kim Green, to hear about how she came to understand and implement crowdsourced security testing within the organization.
Revitalizing Product Securtiy at Zephyr Health from bugcrowd
]]>
910 5 https://cdn.slidesharecdn.com/ss_thumbnails/zephyrhealthslidesnotes-150921184903-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs /slideshow/hi-this-is-urgent-plz-fix-asap-critical-vunlerabilities-and-bug-bounty-programs/51741267 bh15-hithisisurgentplzfix-150817233212-lva1-app6891
Kymberlee Price's Presentation from Black Hat 2015 In this presentation, Kymberlee discusses several highly critical vulnerabilities that have been uncovered through a variety of bug bounty programs and their impact on the customers. With participation from researchers and vendors, attendees will not only see some sweet vulnerabilities broken down, but also why wading through another submission from @CluelessSec might be worth it.]]>

Kymberlee Price's Presentation from Black Hat 2015 In this presentation, Kymberlee discusses several highly critical vulnerabilities that have been uncovered through a variety of bug bounty programs and their impact on the customers. With participation from researchers and vendors, attendees will not only see some sweet vulnerabilities broken down, but also why wading through another submission from @CluelessSec might be worth it.]]>
Mon, 17 Aug 2015 23:32:12 GMT /slideshow/hi-this-is-urgent-plz-fix-asap-critical-vunlerabilities-and-bug-bounty-programs/51741267 bugcrowd@slideshare.net(bugcrowd) HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs bugcrowd Kymberlee Price's Presentation from Black Hat 2015 In this presentation, Kymberlee discusses several highly critical vulnerabilities that have been uncovered through a variety of bug bounty programs and their impact on the customers. With participation from researchers and vendors, attendees will not only see some sweet vulnerabilities broken down, but also why wading through another submission from @CluelessSec might be worth it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bh15-hithisisurgentplzfix-150817233212-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Kymberlee Price&#39;s Presentation from Black Hat 2015 In this presentation, Kymberlee discusses several highly critical vulnerabilities that have been uncovered through a variety of bug bounty programs and their impact on the customers. With participation from researchers and vendors, attendees will not only see some sweet vulnerabilities broken down, but also why wading through another submission from @CluelessSec might be worth it.
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs from bugcrowd
]]>
1209 11 https://cdn.slidesharecdn.com/ss_thumbnails/bh15-hithisisurgentplzfix-150817233212-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV /slideshow/how-portal-can-change-your-security-forever-kati-rodzon-at-bsideslv/51674592 bsideslv15-portalandsecurity-150815190149-lva1-app6892
When used correctly, gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for doing security training. In this talk Kati Rodzon will discuss how games like Portal and Candy Crush were able to make millions and how those same techniques can be used to change security as we know it.]]>

When used correctly, gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for doing security training. In this talk Kati Rodzon will discuss how games like Portal and Candy Crush were able to make millions and how those same techniques can be used to change security as we know it.]]>
Sat, 15 Aug 2015 19:01:49 GMT /slideshow/how-portal-can-change-your-security-forever-kati-rodzon-at-bsideslv/51674592 bugcrowd@slideshare.net(bugcrowd) How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV bugcrowd When used correctly, gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for doing security training. In this talk Kati Rodzon will discuss how games like Portal and Candy Crush were able to make millions and how those same techniques can be used to change security as we know it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsideslv15-portalandsecurity-150815190149-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When used correctly, gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for doing security training. In this talk Kati Rodzon will discuss how games like Portal and Candy Crush were able to make millions and how those same techniques can be used to change security as we know it.
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV from bugcrowd
]]>
625 4 https://cdn.slidesharecdn.com/ss_thumbnails/bsideslv15-portalandsecurity-150815190149-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description /slideshow/how-do-i-shot-web-jason-haddix-at-defcon-23/51422808 howdoishotweb-2-150809005810-lva1-app6891
WATCH JASON'S TALK LIVE, 8/14 @ 11AM PDT - Register Here: http://bgcd.co/DEFCON23-haddix Jason Haddix explores successful tactics and tools used by himself and the best bug hunters. Practical methodologies, tools and tips that make you better at hacking websites and mobile apps to claim those bounties. Follow Jason on Twitter: http://twitter.com/jhaddix Follow Bugcrowd on Twitter: http://twitter.com/bugcrowd Check out the latest bug bounties on Bugcrowd: https://bugcrowd.com/programs]]>

WATCH JASON'S TALK LIVE, 8/14 @ 11AM PDT - Register Here: http://bgcd.co/DEFCON23-haddix Jason Haddix explores successful tactics and tools used by himself and the best bug hunters. Practical methodologies, tools and tips that make you better at hacking websites and mobile apps to claim those bounties. Follow Jason on Twitter: http://twitter.com/jhaddix Follow Bugcrowd on Twitter: http://twitter.com/bugcrowd Check out the latest bug bounties on Bugcrowd: https://bugcrowd.com/programs]]>
Sun, 09 Aug 2015 00:58:10 GMT /slideshow/how-do-i-shot-web-jason-haddix-at-defcon-23/51422808 bugcrowd@slideshare.net(bugcrowd) How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description bugcrowd WATCH JASON'S TALK LIVE, 8/14 @ 11AM PDT - Register Here: http://bgcd.co/DEFCON23-haddix Jason Haddix explores successful tactics and tools used by himself and the best bug hunters. Practical methodologies, tools and tips that make you better at hacking websites and mobile apps to claim those bounties. Follow Jason on Twitter: http://twitter.com/jhaddix Follow Bugcrowd on Twitter: http://twitter.com/bugcrowd Check out the latest bug bounties on Bugcrowd: https://bugcrowd.com/programs <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howdoishotweb-2-150809005810-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> WATCH JASON&#39;S TALK LIVE, 8/14 @ 11AM PDT - Register Here: http://bgcd.co/DEFCON23-haddix Jason Haddix explores successful tactics and tools used by himself and the best bug hunters. Practical methodologies, tools and tips that make you better at hacking websites and mobile apps to claim those bounties. Follow Jason on Twitter: http://twitter.com/jhaddix Follow Bugcrowd on Twitter: http://twitter.com/bugcrowd Check out the latest bug bounties on Bugcrowd: https://bugcrowd.com/programs
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description from bugcrowd
]]>
200992 20 https://cdn.slidesharecdn.com/ss_thumbnails/howdoishotweb-2-150809005810-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
4 Reasons to Crowdsource Your Pen Test /slideshow/4-reasons-to-crowdsource-your-pen-test/51193770 4reasonstocrowdsourceyourpentest-150802181952-lva1-app6891
Penetration testing is a security standard, but that doesn't mean it's the most effective means of assessment. We'll discuss why crowdsourcing your security results in increased coverage and more complex security vulnerabilites while meeting your compliance requirements. We'll also introduce Flex, our crowdsourced pen test that provides increased results.]]>

Penetration testing is a security standard, but that doesn't mean it's the most effective means of assessment. We'll discuss why crowdsourcing your security results in increased coverage and more complex security vulnerabilites while meeting your compliance requirements. We'll also introduce Flex, our crowdsourced pen test that provides increased results.]]>
Sun, 02 Aug 2015 18:19:52 GMT /slideshow/4-reasons-to-crowdsource-your-pen-test/51193770 bugcrowd@slideshare.net(bugcrowd) 4 Reasons to Crowdsource Your Pen Test bugcrowd Penetration testing is a security standard, but that doesn't mean it's the most effective means of assessment. We'll discuss why crowdsourcing your security results in increased coverage and more complex security vulnerabilites while meeting your compliance requirements. We'll also introduce Flex, our crowdsourced pen test that provides increased results. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/4reasonstocrowdsourceyourpentest-150802181952-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Penetration testing is a security standard, but that doesn&#39;t mean it&#39;s the most effective means of assessment. We&#39;ll discuss why crowdsourcing your security results in increased coverage and more complex security vulnerabilites while meeting your compliance requirements. We&#39;ll also introduce Flex, our crowdsourced pen test that provides increased results.
4 Reasons to Crowdsource Your Pen Test from bugcrowd
]]>
1176 7 https://cdn.slidesharecdn.com/ss_thumbnails/4reasonstocrowdsourceyourpentest-150802181952-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Application Security Threats through the Eyes of the Attacker /slideshow/mobile-application-security-threats-through-the-eyes-of-the-attacker/50615134 jhaddixwebinarslides21-150716233627-lva1-app6891
As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.]]>

As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.]]>
Thu, 16 Jul 2015 23:36:27 GMT /slideshow/mobile-application-security-threats-through-the-eyes-of-the-attacker/50615134 bugcrowd@slideshare.net(bugcrowd) Mobile Application Security Threats through the Eyes of the Attacker bugcrowd As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jhaddixwebinarslides21-150716233627-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.
Mobile Application Security Threats through the Eyes of the Attacker from bugcrowd
]]>
1670 6 https://cdn.slidesharecdn.com/ss_thumbnails/jhaddixwebinarslides21-150716233627-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Build or Buy: The Barracuda Bug Bounty Story [Webinar] /slideshow/build-or-buy-the-barracuda-bug-bounty-story-webinar/49853675 barracudawebinarslidesv2-150625231451-lva1-app6892
We sat down with two members of the Barracuda security team to talk about the evolution of their bug bounty program since its inception in 2010, to its current space with Bugcrowd.]]>

We sat down with two members of the Barracuda security team to talk about the evolution of their bug bounty program since its inception in 2010, to its current space with Bugcrowd.]]>
Thu, 25 Jun 2015 23:14:51 GMT /slideshow/build-or-buy-the-barracuda-bug-bounty-story-webinar/49853675 bugcrowd@slideshare.net(bugcrowd) Build or Buy: The Barracuda Bug Bounty Story [Webinar] bugcrowd We sat down with two members of the Barracuda security team to talk about the evolution of their bug bounty program since its inception in 2010, to its current space with Bugcrowd. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/barracudawebinarslidesv2-150625231451-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We sat down with two members of the Barracuda security team to talk about the evolution of their bug bounty program since its inception in 2010, to its current space with Bugcrowd.
Build or Buy: The Barracuda Bug Bounty Story [Webinar] from bugcrowd
]]>
948 5 https://cdn.slidesharecdn.com/ss_thumbnails/barracudawebinarslidesv2-150625231451-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
5 Tips to Successfully Running a Bug Bounty Program /slideshow/5-tips-to-running-a-successful-bug-bounty-program/49703958 bugbountywebinarslides8-28-14-150622200226-lva1-app6892
Learn why bug bounties are great tools in application security, why they can be difficult, and how you can utilize them to start finding more critical vulnerabilities.]]>

Learn why bug bounties are great tools in application security, why they can be difficult, and how you can utilize them to start finding more critical vulnerabilities.]]>
Mon, 22 Jun 2015 20:02:26 GMT /slideshow/5-tips-to-running-a-successful-bug-bounty-program/49703958 bugcrowd@slideshare.net(bugcrowd) 5 Tips to Successfully Running a Bug Bounty Program bugcrowd Learn why bug bounties are great tools in application security, why they can be difficult, and how you can utilize them to start finding more critical vulnerabilities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bugbountywebinarslides8-28-14-150622200226-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn why bug bounties are great tools in application security, why they can be difficult, and how you can utilize them to start finding more critical vulnerabilities.
5 Tips to Successfully Running a Bug Bounty Program from bugcrowd
]]>
1904 4 https://cdn.slidesharecdn.com/ss_thumbnails/bugbountywebinarslides8-28-14-150622200226-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[Webinar] The Art & Value of Bug Bounty Programs /slideshow/webinar-48444938/48444938 bugcrowdartofbugbountywebinaroutlinefinalmay201-150521164931-lva1-app6892
Her TED talk on the power of bug bounties has over a million views, on May 20, 2015, cybersecurity expert Keren Elazari joined Bugcrowd for an exclusive webinar. We did some bug bounty myth busting and trend spotting and had a great turnout. Keren's slides are here.]]>

Her TED talk on the power of bug bounties has over a million views, on May 20, 2015, cybersecurity expert Keren Elazari joined Bugcrowd for an exclusive webinar. We did some bug bounty myth busting and trend spotting and had a great turnout. Keren's slides are here.]]>
Thu, 21 May 2015 16:49:31 GMT /slideshow/webinar-48444938/48444938 bugcrowd@slideshare.net(bugcrowd) [Webinar] The Art & Value of Bug Bounty Programs bugcrowd Her TED talk on the power of bug bounties has over a million views, on May 20, 2015, cybersecurity expert Keren Elazari joined Bugcrowd for an exclusive webinar. We did some bug bounty myth busting and trend spotting and had a great turnout. Keren's slides are here. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bugcrowdartofbugbountywebinaroutlinefinalmay201-150521164931-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Her TED talk on the power of bug bounties has over a million views, on May 20, 2015, cybersecurity expert Keren Elazari joined Bugcrowd for an exclusive webinar. We did some bug bounty myth busting and trend spotting and had a great turnout. Keren&#39;s slides are here.
[Webinar] The Art & Value of Bug Bounty Programs from bugcrowd
]]>
1322 5 https://cdn.slidesharecdn.com/ss_thumbnails/bugcrowdartofbugbountywebinaroutlinefinalmay201-150521164931-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-bugcrowd-48x48.jpg?cb=1684346430 https://cdn.slidesharecdn.com/ss_thumbnails/bounties-ransomware-and-other-cyber-hype-191225141117-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bug-bounties-ransomware-and-other-cyber-hype-for-legal-counsel/210407433 Bug Bounties, Ransomwa... https://cdn.slidesharecdn.com/ss_thumbnails/thebughuntersmethodology-170928211328-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ekoparty-2017-the-bug-hunters-methodology/80270076 Ekoparty 2017 - The Bu... https://cdn.slidesharecdn.com/ss_thumbnails/instructurebugcrowdwebinar-170428183307-thumbnail.jpg?width=320&height=320&fit=bounds bugcrowd/3-reasons-to-swap-your-next-pen-test-with-a-bug-bounty-program 3 Reasons to Swap Your...