Closing Keynote: Measuring and maximizing vuln discovery efforts
The crowdsourced security model has been embraced by organizations running bug bounty programs. These programs are intended to discover and resolve vulns in production applications. However, without good preparation or supporting processes, they too often deviate from an effective part of the security development lifecycle into a source of noise. This presentation demonstrates how to measure and manage the time and budget invested in vuln discovery in order to make these kinds of programs successful. It covers strategies for keeping a program focused on positive, risk-based contributions to development.
This presentation shows various metrics collected from real-world data to help organizations determine how to make vuln discovery cost-effective, efficient, and reduce risk. These metrics include guidance on how to model bounty programs, how to monitor their effectiveness, and considerations for allocating budgets.
The presentation also explores what the emergence of bounty programs implies about trends in appsec automation and where major gaps remain. Tools must remain part of any crowdsourced security model. From budgeting to communications, there are more challenges to building a useful appsec program than just determining whether a bug exists.