A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Formula for a Bug Bounty Program - Chris Holt NolaCon 2019 (Hacking Illustrated Series InfoSec <br>Tutorial Videos)


Formula for a Bug Bounty Program
Chris Holt

@humor4fun


Bug bounty programs are increasingly common in today's security organizations, and they can be of great value if implemented well. Before initiating your own bug bounty program, it's important to understand some do's and don'ts. \n\nToday Verizon Media operates one of the largest bug bounty programs, having paid out $5 million in bounties in 2018. This presentation is the first in a series that offers a glimpse into how Verizon Media has grown its successful program and offers best practices for organizations looking to start their own program or for those looking to optimize existing programs.



Certified by GAIC, NTISSI, PADI, and previously by the USSF, Chris Holt is constantly learning something new. As the Senior Bug Bounty Operations Lead at Verizon Media, he is responsible for the bug bounty program operations, development and growth including live hacking events. Previously, Chris worked on web, api and mobile mobile application penetration testing across many different types of products but currently is found operating the bug bounty program at Verizon Media.



Recorded at NolaCon 2019




Back to NolaCon 2019 video list


Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast