Submissions
Shrutirupa Banerjiee

Shrutirupa Banerjiee

@shrutirupa

  • Joined Mar 2019

Setting up a bug bounty programme in your organization

Video thumbnail

Why does your organization need a bug bounty programme?

With emerging technologies and advancements in security, threat actors are becoming more and more refined in their approach to attacking systems and infrastructure. It is now the new normal to read news about large enterprises becoming the target of ransomware attempts and data breaches with the haul from the latter being trafficked on websites hosted on the TOR network. It is necessary to acknow… more
  • 0 comments
  • Submitted
  • 16 Nov 2022

Setting up a bug bounty programme in your organization

Prerequisites to creating a bug bounty programme

A bug bounty programme can be one of the solutions to maintain a good security culture in your organization. However, building a bug bounty programme can be challenging. Now that we are clear about the importance of the setting up a bug bounty programme, let us look at the essential prerequisites the a company should follow when setting up such a programme. more
  • 0 comments
  • Submitted
  • 24 Nov 2022

Setting up a bug bounty programme in your organization

How to start a bug bounty program?

Starting a Bug Bounty programme can be a tedious task. Yet, it is important for the security engineering culture of the organization. It adds another layer of security to an organization’s infrastructure. Now that you understand the Whys and Whats of bug bounty programmes, let’s dive a little deeper into how to start one. I will deduce the elements that should be considered before an organization… more
  • 0 comments
  • Submitted
  • 10 Jan 2023

Setting up a bug bounty programme in your organization

What to keep in mind when running a bug bounty programme?

Starting a bug bounty programme may seem like an enormous task. Regardless, if it is properly planned and managed, it becomes quite easy to implement. Each team should be well aware of its roles and responsibilities. After having seen how to start a bug bounty program, I’ll walk you through some important suggestions that should be kept in mind while running the bug bounty programme. more
  • 0 comments
  • Submitted
  • 10 Jan 2023

Rootconf Pune edition

Let us Gossip about it!!!

My talk will include the basics of gossip protocol along with in-depth knowledge of it’s working mechanism. This talk will give an overview of the entire protocol including very minute details along with the mathematics involved. I will also use a code snippet to explain the practical implemenation of the protocol. more
  • 7 comments
  • Confirmed & scheduled
  • 05 Mar 2019
Section: Full talk of 40 mins duration Technical level: Beginner Section: Full talk (40 mins) Category: Encryption

Rootconf Delhi edition

The era of Smart Contracts

Blockchain is one of the emerging technologies which is making it’s way into different sectors such as banking and health care industries. The application and adoption of Smart Contract is spreading because it aids to solving real life problems. The session will talk about the era of Smart Contracts from the time it first came into existence to the time it is being used for solving various proble… more
  • 3 comments
  • Rejected
  • 29 Oct 2019
Section: Full talk (40 mins) Category: Others

Rootconf Sessions

Secure Coding with Cryptography

Secure Coding practices are one of the important aspect in security. Cryptography is another such domain which is often missed while taking care of security. In this session, the audience will learn about basic cryptography and the algorithms used. We will be discussing about some insecure practices and why they should not be used. Once, the audience is well aware of the basics, we will deep dive… more
  • 3 comments
  • Rejected
  • 29 Feb 2020

Detecting anomalous network patterns

Magecart - The Rising Threat to e-commerce Websites

The news about a cyber attack in a big enterprise is not new. We keep on hearing about such attacks and how millions of data are being stolen or leaked. Thus, Data breaches are one common impact of cyber attacks in any large organization. Attackers keep on looking for newer exploits or rare kinds of attacks to steal user information and use them for malicious use. In this session, the audience wi… more
  • 5 comments
  • Waitlisted
  • 25 May 2021