Permalink
Fetching contributors…
Cannot retrieve contributors at this time
51 lines (34 sloc) 1.17 KB
layout title type track technology related-to status when-day when-time location room-layout organizers participants outcomes
blocks/working-session
Bug Bounty Playbook
workshop
Security Playbooks
done
Fri
AM-1
Room-5
cabaret
Jonas Vanalderweireldt
not-found

Why

Handling external submissions of security vulnerabilities either directly or via bug bounty programmes is not a trivial task and should not be left to chance.

It is critical to follow very specific workflows that address the original issue, and that discover and fix (if necessary) any possible variations.

It is also very important to have very focused and technically correct exchanges with the external individual(s) who submitted the security vulnerability.

This Working Session will create a bug bounty playbook.

What

  • Create Bug bounty playbook

Outcomes

  • Bug bounty playbook

Who

The target audience for this Working Session is:

  • Security teams
  • Bug bounty companies
  • Bug bounty hunters

Working materials

  • Bug bounty playbook

(please add as much information as possible before the sessions)