Closing Keynote: Measuring and maximizing vuln discovery efforts

mike-shema
23 Feb 2018
15:20 - 16:10
Keynote | Merchant Court Ballroom

Closing Keynote: Measuring and maximizing vuln discovery efforts

The crowdsourced security model has been embraced by organizations running bug bounty programs. These programs are intended to discover and resolve vulns in production applications. However, without good preparation or supporting processes, they too often deviate from an effective part of the security development lifecycle into a source of noise. This presentation demonstrates how to measure and manage the time and budget invested in vuln discovery in order to make these kinds of programs successful. It covers strategies for keeping a program focused on positive, risk-based contributions to development.

This presentation shows various metrics collected from real-world data to help organizations determine how to make vuln discovery cost-effective, efficient, and reduce risk. These metrics include guidance on how to model bounty programs, how to monitor their effectiveness, and considerations for allocating budgets.

The presentation also explores what the emergence of bounty programs implies about trends in appsec automation and where major gaps remain. Tools must remain part of any crowdsourced security model. From budgeting to communications, there are more challenges to building a useful appsec program than just determining whether a bug exists.

This website uses cookies to ensure you get the best experience on our website More info

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close