3/25/2023 0 Comments Doorman osquery![]() Katie's talk focused on alternate bounty models and levers that don't require vendors to be the highest bidder to create successful structured incentive programs that bring about specific strategic outcomes. Her talk showed how the game theory, economics, politics and data turned heresy to gospel at the world's largest software company. ![]() Katie Moussouris, now Chief Policy Officer of HackerOne, dove into the development of Microsoft's bug bounty program, which she pioneered over three years of looking at data starting in 2010 and announced in 2013. Mutiny on the Bounty: Lessons Learned in How Data Defeated Dogma Scott Renfro of Facebook's Security Infrastructure team welcomed the group to this year's Security by discussing the state of cyber security and his experience with past Security conferences. Presentation Summaries and Videos Opening Remarks Check out the talks below to hear from some of the industry's leading voices on security solutions that scale. Our jobs, as security team leaders, encompass everything from incident response and product consulting to compliance and, more generally, cleaning up all the code on our networks.Īt the event last Wednesday, we previewed where security was as far back as 2010, how far it has come, and how much we still have to accomplish. Our goals are ultimately the same: finding better engineering solutions so our front-end teams don't have to always think about writing security into their programs but can benefit by default. Recent internet-wide incidents involving SSL technology, such as POODLE and Heartbleed, only reinforce the importance of getting this stuff right, as well as the extent to which security technology impacts more than any single company.įor our second Security conference, we wanted to openly discuss and learn from the different ways companies such as GitHub, HackerOne, Square, Twitter, and Facebook are solving the same problems. Making online services safe and secure for more than a billion people means that security solutions have to scale well.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |