How to Build a Bug Bounty Program from Scratch


Posted on in Presentations

Thinking about starting a bug bounty program? Bug bounty programs are a way for companies to tap into the ethical hacker community, and reward the finders that help them strengthen the security of their products and company. This session will describe a vision and process for building a bug bounty program at any company, and deliver actionable guidance for participants to take back to their own companies.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.


Pre-Requisites:
Attendees should have a basic idea of bug bounty and vulnerability management programs, and some related nomenclature.


This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

 

Participants
Adam (Rudd) Ruddermann

Facilitator

Head of Bug Bounty and Vulnerability Management, Zoom Video Communications

Hackers & Threats Technology Infrastructure & Operations

hackers & threats security awareness security operations threat management


Topic

Subtopic


Share With Your Community