Webinar

On-Demand Webinar

Economics of 0-Day Disclosures: The Good, Bad and Ugly

ON-DEMAND RECORDING: Threatpost webinar on how the zero-day bug economy works and why understanding it can keep your company safe.

The way vulnerabilities are disclosed shape the behavior of security teams and attackers themselves. The process poses an existential risk for companies dependent on their own and third-party code.

Understanding the economics and motivations behind zero-day bug discoveries needs to be a priority for cybersecurity professionals for identifying and defending against emerging threats.

Threatpost is joined by a panel of bug bounty experts and zero-day researchers who discuss current disclosure rules, policies and the myriad of proposed vulnerability disclosure frameworks, including Katie Trimble-Noble, Director PSIRT, and Bug Bounty at Intel and Greg Ose, Director, Product Security Engineering, GitHub, and James McQuiggan, Security Awareness Advocate for the KnowBe4 Company

This webinar is ideal for any company managing their own bug bounty program, pen tester and bug bounty hunters who want to know more about the economics behind software vulnerabilities.

Takeaways include:

  • Vulnerability buyers and sellers and how pricing is determined.
  • Best practices for internal security teams working with outside researchers.
  • Best practices for outside researchers working with internal security teams.

True stories from security experts will outline how disclosure can be done exceptionally well and sometimes disastrously.

(Interested in more about how your company can get involved with Threatpost webinars? Contact advertise@threatpost.com to learn more about Sponsored and Underwriting opportunities.)

Related

Tips and Tactics for Better Threat Hunting

Learn the tips and tactics for better threat hunting. Register today for Threatpost’s upcoming FREE live webinar, in partnership with Palo Alto Networks, on Thursday, June 3 at 2 PM EDT, into how Palo Alto Networks’ Unit 42 goes about their threat hunting and how automation can be used to great effect for threat intelligence.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.