SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Key Takeaways from
Instructure’s Bug Bounty
Program
Presenters:
Q. Wade Billings, Sr. Director of Global IT Shared Services : Instructure
Jonathan Cran, VP Operations : Bugcrowd
Your Presenters
• Q. Wade Billings, Sr. Director of Global IT Shared Services
Instructure
• IT leadership career spanning over 20 years. Held high level
positions with Excite@Home, lowermybills.com, Medicity and
most recently WorkFront (fka AtTask)
• Involved in the Utah InfoSec community with ties to
BSidesSLC and UtahSec.org
• Jonathan Cran, VP Operations Bugcrowd
• Security Assessment Startups. Leadership positions with
Rapid7, Pwnie Express, Metasploit.
About Instructure
• Instructure makes smart software that makes people smarter
• Instructure is a fast growing, education technology SaaS
company serving multiple global markets
• Our growth since launch in 2011
• 18+ million users
• 1,200 institutions under contract
• 500+ employees
• Global offices and five hosting platforms worldwide
About Bugcrowd
• Your Elastic Security Team
• Founded in 2012, based in San Francisco, 20
employees
• 15,000 Researchers, $400,000 in researcher payments
in 2014, 150 programs
• Provider of Crowdcontrol, the platform for Bug Bounty
and Flex Bounty programs
• We help you start and manage your bug bounty program
Annual Assessment
• We update our platform every three weeks and users
benefit from features and bug fixes.
• Starting in 2011, Instructure took a proactive approach to
security.
• We publicly published results after the first security audit
• When vulnerabilities were found, we fixed them and put
them into production as quickly as possible
• We even embedded a blogger to observe and document
the process!!
Why Bugcrowd?
• This year we wanted to take it a step further.
• Economics of bug bounties promised better results
compared to the traditional approach
• Large researcher community, strong engagement
• Flex bounty met the “Annual Assessment” format
Bugcrowd Flex
• Two week bug bounty
• Private with vetted researchers
• Top placed rewards (35%), Others (65%)
• Flex Bounty Report
• Access to researchers and management platform
Flex Reward Structure
Flex Process
• Step 1: Onboarding
• Step 2: Program opens to private, vetted researchers
• Step 3: Crowdcontrol removes duplicates and out of scope
issues, providing quick feedback to researchers
• Step 4: Customer Validates, Assigns Awards and Authorizes
Payments
• Step 5: Program Closes, Report Created, Report Delivered
• Step 6: Customer resolves and Researcher re-tests (if
requested)
Flex Process
Flex Results
• Instead of two or three security
researchers, we had 63+
researchers active during the test
• 10x the number of vulnerabilities
identified
• This is NOT because Instructure is
less secure - we have been doing
these open audits each year for
three years
• Each researcher comes at the
problem with a different perspective
Flex Results
• Stored XSS
• Sending messages
for unsubscribed
courses
• Encrypted Cookie
Store malleability /
Key-reuse
• https://blog.bugcrowd.com/increased-pen-test-results-instructure-flex/
Key Takeaways
• Security is a process, and you can benefit by being
transparent about your assessment process
• Flex bounties work! More, high-quality results by
engaging with the research community vs traditional
methods
• Bugcrowd is helping make the bug bounty programs
accessible to organizations
• Download the report: https://blog.bugcrowd.com/
increased-pen-test-results-instructure-flex/
What’s next
• We’ve launched a new ongoing bug bounty
program in partnership with Bugcrowd
• Our overarching goal is to create the most secure
learning and engagement platform for teachers
and corporate trainers across the world.
• We do this by being proactive and playing offense
when it comes to security, not defense.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Getting to Know Security and Devs: Keys to Successful DevSecOps
Getting to Know Security and Devs: Keys to Successful DevSecOpsGetting to Know Security and Devs: Keys to Successful DevSecOps
Getting to Know Security and Devs: Keys to Successful DevSecOps
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
 
Pentest as a Service Impact 2020
Pentest as a Service Impact 2020Pentest as a Service Impact 2020
Pentest as a Service Impact 2020
 
Silver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSilver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security Solutions
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOps
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
Preventing Information Flow with Jeeves - Singapore Data Privacy WorkshopPreventing Information Flow with Jeeves - Singapore Data Privacy Workshop
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
 
The R.O.A.D to DevOps
The R.O.A.D to DevOpsThe R.O.A.D to DevOps
The R.O.A.D to DevOps
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Practical DevSecOps Using Security Instrumentation
Practical DevSecOps Using Security InstrumentationPractical DevSecOps Using Security Instrumentation
Practical DevSecOps Using Security Instrumentation
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Nucleus small
Nucleus smallNucleus small
Nucleus small
 

Ähnlich wie Key Takeaways from Instructure's Successful Bug Bounty Program

Introducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdfIntroducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdf
Association for Project Management
 

Ähnlich wie Key Takeaways from Instructure's Successful Bug Bounty Program (20)

Owasp LA
Owasp LAOwasp LA
Owasp LA
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
Dr Abel Sanchez at Bristlecone Pulse 2017 MIT
Dr Abel Sanchez at Bristlecone Pulse 2017 MITDr Abel Sanchez at Bristlecone Pulse 2017 MIT
Dr Abel Sanchez at Bristlecone Pulse 2017 MIT
 
Advanced Agile Product Ownership
Advanced Agile Product OwnershipAdvanced Agile Product Ownership
Advanced Agile Product Ownership
 
Building Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDBBuilding Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDB
 
Introductie slides Advanced Agile Product Ownership door het Nederlands Insti...
Introductie slides Advanced Agile Product Ownership door het Nederlands Insti...Introductie slides Advanced Agile Product Ownership door het Nederlands Insti...
Introductie slides Advanced Agile Product Ownership door het Nederlands Insti...
 
SGCI OAC webinar 4 18-19
SGCI OAC webinar 4 18-19SGCI OAC webinar 4 18-19
SGCI OAC webinar 4 18-19
 
Build Big Data Products at LinkedIn
Build Big Data Products at LinkedInBuild Big Data Products at LinkedIn
Build Big Data Products at LinkedIn
 
Pivotal's Secret Sauce
Pivotal's Secret SaucePivotal's Secret Sauce
Pivotal's Secret Sauce
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Presentation final.pptx (1)
Presentation final.pptx (1)Presentation final.pptx (1)
Presentation final.pptx (1)
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Near east university
Near east universityNear east university
Near east university
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Proposed Title Fear and Loathing in Agility: Long Live the Accounting Departm...
Proposed Title Fear and Loathing in Agility: Long Live the Accounting Departm...Proposed Title Fear and Loathing in Agility: Long Live the Accounting Departm...
Proposed Title Fear and Loathing in Agility: Long Live the Accounting Departm...
 
Adding Value with Change Management
Adding Value with Change ManagementAdding Value with Change Management
Adding Value with Change Management
 
Introducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdfIntroducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdf
 
Agile Development And Medtech
Agile Development And MedtechAgile Development And Medtech
Agile Development And Medtech
 
Salesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce Security: Fully Automated
Salesforce Security: Fully Automated
 

Mehr von bugcrowd

Mehr von bugcrowd (12)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 
If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)
 
AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'
 
Bug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in NumbersBug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in Numbers
 
If You Can't Beat 'Em, Join 'Em
 If You Can't Beat 'Em, Join 'Em If You Can't Beat 'Em, Join 'Em
If You Can't Beat 'Em, Join 'Em
 
Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLVHow Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
 
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
 
5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program
 
How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Key Takeaways from Instructure's Successful Bug Bounty Program

  • 1.
  • 2. Key Takeaways from Instructure’s Bug Bounty Program Presenters: Q. Wade Billings, Sr. Director of Global IT Shared Services : Instructure Jonathan Cran, VP Operations : Bugcrowd
  • 3. Your Presenters • Q. Wade Billings, Sr. Director of Global IT Shared Services Instructure • IT leadership career spanning over 20 years. Held high level positions with Excite@Home, lowermybills.com, Medicity and most recently WorkFront (fka AtTask) • Involved in the Utah InfoSec community with ties to BSidesSLC and UtahSec.org • Jonathan Cran, VP Operations Bugcrowd • Security Assessment Startups. Leadership positions with Rapid7, Pwnie Express, Metasploit.
  • 4. About Instructure • Instructure makes smart software that makes people smarter • Instructure is a fast growing, education technology SaaS company serving multiple global markets • Our growth since launch in 2011 • 18+ million users • 1,200 institutions under contract • 500+ employees • Global offices and five hosting platforms worldwide
  • 5. About Bugcrowd • Your Elastic Security Team • Founded in 2012, based in San Francisco, 20 employees • 15,000 Researchers, $400,000 in researcher payments in 2014, 150 programs • Provider of Crowdcontrol, the platform for Bug Bounty and Flex Bounty programs • We help you start and manage your bug bounty program
  • 6. Annual Assessment • We update our platform every three weeks and users benefit from features and bug fixes. • Starting in 2011, Instructure took a proactive approach to security. • We publicly published results after the first security audit • When vulnerabilities were found, we fixed them and put them into production as quickly as possible • We even embedded a blogger to observe and document the process!!
  • 7. Why Bugcrowd? • This year we wanted to take it a step further. • Economics of bug bounties promised better results compared to the traditional approach • Large researcher community, strong engagement • Flex bounty met the “Annual Assessment” format
  • 8. Bugcrowd Flex • Two week bug bounty • Private with vetted researchers • Top placed rewards (35%), Others (65%) • Flex Bounty Report • Access to researchers and management platform
  • 10. Flex Process • Step 1: Onboarding • Step 2: Program opens to private, vetted researchers • Step 3: Crowdcontrol removes duplicates and out of scope issues, providing quick feedback to researchers • Step 4: Customer Validates, Assigns Awards and Authorizes Payments • Step 5: Program Closes, Report Created, Report Delivered • Step 6: Customer resolves and Researcher re-tests (if requested)
  • 12. Flex Results • Instead of two or three security researchers, we had 63+ researchers active during the test • 10x the number of vulnerabilities identified • This is NOT because Instructure is less secure - we have been doing these open audits each year for three years • Each researcher comes at the problem with a different perspective
  • 13. Flex Results • Stored XSS • Sending messages for unsubscribed courses • Encrypted Cookie Store malleability / Key-reuse • https://blog.bugcrowd.com/increased-pen-test-results-instructure-flex/
  • 14. Key Takeaways • Security is a process, and you can benefit by being transparent about your assessment process • Flex bounties work! More, high-quality results by engaging with the research community vs traditional methods • Bugcrowd is helping make the bug bounty programs accessible to organizations • Download the report: https://blog.bugcrowd.com/ increased-pen-test-results-instructure-flex/
  • 15. What’s next • We’ve launched a new ongoing bug bounty program in partnership with Bugcrowd • Our overarching goal is to create the most secure learning and engagement platform for teachers and corporate trainers across the world. • We do this by being proactive and playing offense when it comes to security, not defense.