Keynote address: Choose your own keynote adventure - bounties and standards and vuln disclosure, oh my!

Wednesday 24 September 10:50 - 11:30, Green room.

Katie Moussouris HackerOne

Join the interactive keynote about the topics you chose. Some questions will be from Twitter, and some from the live audience, as we discuss various elements of vulnerability response, from bounties to vulnerability coordination to standards with Katie Moussouris, Chief Policy Officer of HackerOne.

Click here for more details about the conference.

Katie Moussouris

Katie Moussouris

Katie Moussouris is the Chief Policy Officer of HackerOne, where she oversees the company's philosophy and approach to vulnerability coordination and disclosure, advises customers and researchers, and works toward the public good to legitimize and promote security research to help make the Internet safer for everyone. Katie Moussouris' Microsoft work encompassed industry-leading initiatives such as Microsoft's bounty programs, BlueHat content chair, security researcher outreach, vulnerability disclosure policies, and MSVR (Microsoft Vulnerability Research). She also serves as a subject matter expert for the US National Body of the International Standards Organization (ISO), in vulnerability disclosure (29147), secure development (27034), penetration testing (20004-2) and vulnerability handling processes (30111). Ms. Moussouris was one of the Artists Formerly Known as @stake, and has performed dozens of software penetration tests, security code audits, and design reviews for major companies. She was honored with the 2011 Executive Women's Forum Women of Influence Award in the category of One to Watch. Ms. Moussouris is a renowned keynote speaker and has presented at Security Analyst Summit 2014, RSA 2014 and Nordic Security Con 2013, as well as several others. She also was an invited speaker at Harvard Business School, MIT, HitB Malaysia 2012 and the Executive Womens Forum 2012 She is working on a book about vulnerability disclosure do's and don'ts for vendors.



We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.