tapping hackers for continuous security: that's hacker-powered security

17
Tapping Hackers for Continuous Security Michiel Prins FinDEVr NYC | March 21st, 2017

Upload: hackerone

Post on 13-Apr-2017

67 views

Category:

Internet


8 download

TRANSCRIPT

Page 1: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

Tapping Hackers for Continuous SecurityMichiel PrinsFinDEVr NYC | March 21st, 2017

Page 2: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

m@mbp ~ $ whoami

2

Michiel Prins

Co-founder @ HackerOne

Engineer

Hacker

Hackeroni

Page 3: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

Hack·er /ˈhakər/

3

one who enjoys the intellectual challenge of creatively overcoming limitations

Page 4: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

4

THE WORLD IS CHANGING

Images from Checkmarx

Page 5: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

5

THE WORLD IS CHANGING

Images from Checkmarx

Page 6: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

6

HOW WOULD A HACKER CONTACT YOU?

Page 7: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

7

HOW WOULD A HACKER CONTACT YOU?

Page 8: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

8

WHAT IS HACKER POWERED SECURITY?

Vulnerability Coordination Bug Bounty Programs

Reactive Approach Incentivize research with $$$

See Something? Say Something! Engineers Learn through Practical Examples

“Welcome Mat” Save $$$ on Pentests

Compliance (e.g. ISO 29147) Cherry on top of the SDLC

Page 9: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

9

We’re Getting Married: Bug Bounty and SDLC

Page 10: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

10

Continuous Delivery + Agile Securityrequire 'continuous_delivery'require 'continuous_security'

Page 11: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

11

Analyzing Bug Bounty output

Page 12: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

12

ENGINEERS LEARN WITH HACKTIVITY

Page 13: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

A practical example

13

From HackerOne customer itBit Exchange, as featured on Hacktivity

Page 14: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

14

Page 15: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

Learn @ Hacktivity

15

https://hackerone.com/hacktivity

Page 16: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

16

Page 17: Tapping Hackers for Continuous Security: That's Hacker-Powered Security

Q&[email protected]

twitter: @michielprins