This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:20161004-Bug Bounty progams in Switzerland-Florian Badertscher.pdf"

From OWASP
Jump to: navigation, search
(For over a year now Swisscom runs its own Bug Bounty program and has chosen to follow a different approach than many of the other well-known programs. Learn what it takes to set up the program, keep it running in a highly diverse environment and deal w...)
 
(No difference)

Latest revision as of 04:50, 6 October 2016

For over a year now Swisscom runs its own Bug Bounty program and has chosen to follow a different approach than many of the other well-known programs. Learn what it takes to set up the program, keep it running in a highly diverse environment and deal with the different needs and limitations from a Telco, ISP and IT Services perspective. We will share insights into the program and the real value it delivers to the company, in addition to the vulnerabilities you learn about.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current04:50, 6 October 2016 (1.37 MB)Schattenbaum (talk | contribs)For over a year now Swisscom runs its own Bug Bounty program and has chosen to follow a different approach than many of the other well-known programs. Learn what it takes to set up the program, keep it running in a highly diverse environment and deal w...
  • You cannot overwrite this file.

There are no pages that link to this file.