<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Bug Bounty in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9124#M43</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;looking for your experience and knowledge on how you or your company handles Bug Bounty requests from those claiming to have found vulnerabilities on your company website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an established Bug Bounty program?&lt;/P&gt;&lt;P&gt;What does your program include?&lt;/P&gt;&lt;P&gt;How do you engaged with the reporter?&lt;/P&gt;&lt;P&gt;How do you verify their identity and their legitimacy?&lt;/P&gt;&lt;P&gt;What is the payment or reward for verified vulnerabilities?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interested in what has worked and what has not worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Apr 2018 19:27:25 GMT</pubDate>
    <dc:creator>Shedoesinfosec</dc:creator>
    <dc:date>2018-04-05T19:27:25Z</dc:date>
    <item>
      <title>Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9124#M43</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;looking for your experience and knowledge on how you or your company handles Bug Bounty requests from those claiming to have found vulnerabilities on your company website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an established Bug Bounty program?&lt;/P&gt;&lt;P&gt;What does your program include?&lt;/P&gt;&lt;P&gt;How do you engaged with the reporter?&lt;/P&gt;&lt;P&gt;How do you verify their identity and their legitimacy?&lt;/P&gt;&lt;P&gt;What is the payment or reward for verified vulnerabilities?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interested in what has worked and what has not worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 19:27:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9124#M43</guid>
      <dc:creator>Shedoesinfosec</dc:creator>
      <dc:date>2018-04-05T19:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9130#M44</link>
      <description>&lt;P&gt;I've worked at two companies that have had their own bug bounty programs (full disclosure: each on their own platform).&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to&amp;nbsp;receive vulnerabilities, you should be able to respond very rapidly and politely every single time.&amp;nbsp; If you can't treat every incoming report as your most important job that day, a reporter may take offense.&amp;nbsp; Every researcher should get professional treatment respecting their kind contribution.&amp;nbsp; The two major models are do it yourself and have someone do it for you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am personally happy to assist in any way, and can be reached at rkrishnan@synack.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I&amp;nbsp;say much more, I will sound like&amp;nbsp;an annoying vendor engaged in self-promotion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 02:29:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9130#M44</guid>
      <dc:creator>rfkrishnan</dc:creator>
      <dc:date>2018-04-06T02:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9167#M45</link>
      <description>&lt;P&gt;Thank you very much for your response. I'll take what you've shared into consideration as we develop our strategies.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 13:16:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9167#M45</guid>
      <dc:creator>Shedoesinfosec</dc:creator>
      <dc:date>2018-04-09T13:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9208#M46</link>
      <description>&lt;P&gt;It is really depends on the budget and time you have.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To sum up- Bug Bounty process should be addition to your company's vulnerability management program, but with mature VM program you wont&amp;nbsp; really need a Bug Bounty.&lt;/P&gt;&lt;P&gt;And you dont really need the whole program for that- only process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The key idea is to make sure that bug reported is reviewed by applicable sec team (with dev team if applicable).&amp;nbsp;&lt;/P&gt;&lt;P&gt;And scanning for vulnerabilities/bugs are performed periodically-&amp;nbsp; by internal and/or external parties.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dont deal with unknown "bug reporters".&amp;nbsp; It is much cheaper to hire well known sec company which will use their tools and skills to check you stuff otta there. Or, get own expertise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 20:41:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/9208#M46</guid>
      <dc:creator>Azimuth</dc:creator>
      <dc:date>2018-04-10T20:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/12636#M331</link>
      <description>&lt;P&gt;Doesn't a "Bug Bounty" concept (potentially) encourage ransomware?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jul 2018 20:58:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/12636#M331</guid>
      <dc:creator>CEMyers</dc:creator>
      <dc:date>2018-07-22T20:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Bug Bounty</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/12718#M341</link>
      <description>&amp;gt; CEMyers (Newcomer III) posted a new reply in Tech Talk on 07-22-2018 04:58 PM in the (ISC)Â² Community :&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Doesn't a "Bug Bounty" concept (potentially) encourage ransomware?&lt;BR /&gt;&lt;BR /&gt;Oh, this debate goes back at least 30 years (in one form or another). Yes, we've&lt;BR /&gt;seen where boounties, of various types, encouraged all kinds of malware. (I can't&lt;BR /&gt;recall instances where it specifically promoted ransomware, but all kinds of&lt;BR /&gt;malware, certainly.) Then there's the situations where your bounty isn't big&lt;BR /&gt;enough, and somebody discovers something really big, and figures they can make&lt;BR /&gt;more money exploiting it than taking your paltry bounty. Then there is the usual&lt;BR /&gt;lack of specification and limitation on bounty programs, and companies who get&lt;BR /&gt;hacked, claim "we didn't mean that!" and try to throw the researcher in jail.&lt;BR /&gt;&lt;BR /&gt;I'm not a big fan of bounty programs.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;If God had intended man to fly, He would never have given us the TSA&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://www.infosecbc.org/links" target="_blank"&gt;http://www.infosecbc.org/links&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;</description>
      <pubDate>Mon, 23 Jul 2018 19:04:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Bug-Bounty/m-p/12718#M341</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-07-23T19:04:13Z</dc:date>
    </item>
  </channel>
</rss>

