Setting up a bug bounty programme in your organization Why does your organization need a bug bounty programme?With emerging technologies and advancements in security, threat actors are becoming more and more refined in their approach to attacking systems and infrastructure. It is now the new normal to read news about large enterprises becoming the target of ransomware attempts and data breaches with the haul from the latter being trafficked on websites hosted on the TOR network. It is necessary to acknow… more
|
Setting up a bug bounty programme in your organization Prerequisites to creating a bug bounty programmeA bug bounty programme can be one of the solutions to maintain a good security culture in your organization. However, building a bug bounty programme can be challenging. Now that we are clear about the importance of the setting up a bug bounty programme, let us look at the essential prerequisites the a company should follow when setting up such a programme. more
|
Setting up a bug bounty programme in your organization How to start a bug bounty program?Starting a Bug Bounty programme can be a tedious task. Yet, it is important for the security engineering culture of the organization. It adds another layer of security to an organization’s infrastructure. Now that you understand the Whys and Whats of bug bounty programmes, let’s dive a little deeper into how to start one. I will deduce the elements that should be considered before an organization… more
|
Setting up a bug bounty programme in your organization What to keep in mind when running a bug bounty programme?Starting a bug bounty programme may seem like an enormous task. Regardless, if it is properly planned and managed, it becomes quite easy to implement. Each team should be well aware of its roles and responsibilities. After having seen how to start a bug bounty program, I’ll walk you through some important suggestions that should be kept in mind while running the bug bounty programme. more
|
Rootconf Pune edition Let us Gossip about it!!!My talk will include the basics of gossip protocol along with in-depth knowledge of it’s working mechanism. This talk will give an overview of the entire protocol including very minute details along with the mathematics involved. I will also use a code snippet to explain the practical implemenation of the protocol. more
Section: Full talk of 40 mins duration
Technical level: Beginner
Section: Full talk (40 mins)
Category: Encryption
|
Rootconf Delhi edition The era of Smart ContractsBlockchain is one of the emerging technologies which is making it’s way into different sectors such as banking and health care industries. The application and adoption of Smart Contract is spreading because it aids to solving real life problems. The session will talk about the era of Smart Contracts from the time it first came into existence to the time it is being used for solving various proble… more
Section: Full talk (40 mins)
Category: Others
|
Rootconf Sessions Secure Coding with CryptographySecure Coding practices are one of the important aspect in security. Cryptography is another such domain which is often missed while taking care of security. In this session, the audience will learn about basic cryptography and the algorithms used. We will be discussing about some insecure practices and why they should not be used. Once, the audience is well aware of the basics, we will deep dive… more
|
Detecting anomalous network patterns Magecart - The Rising Threat to e-commerce WebsitesThe news about a cyber attack in a big enterprise is not new. We keep on hearing about such attacks and how millions of data are being stolen or leaked. Thus, Data breaches are one common impact of cyber attacks in any large organization. Attackers keep on looking for newer exploits or rare kinds of attacks to steal user information and use them for malicious use. In this session, the audience wi… more
|