ISSA Chicago Chapter February Meeting
Event submitted on Tuesday, January 28th 2020, approved by Charles Villanueva ✓
Stay Safe, Stay Strong and we'll see you on the other side. Your friends at InfoSec Conferences.
This event has been tagged as follows:
If you’re not a member of ISSA and work in Cybersecurity then we’d absolutely encourage you to get involved with the institution. One of the great things about ISSA is that they organize infosec events like this one taking place in Chicago, as well as helping you network with fellow Cybersecurity professionals in Illinois. Let us know if you attend this event, we’d love to learn more!
The following description was either submitted by the Conference Organizer on Tuesday, January 28th 2020, or created by us.Add this conference to your favourites
Everyone is invited to join the ISSA Chicago Chapter for their monthly chapter meeting. The featured speaker for the February meeting is Dustin Childs, Sr. Security from Trend Micro.
Hors d’oeuvres will be served. Cash bar available. ISSA Chicago Chapter members will receive a complimentary drink if they register for the meeting as members.
The topic title for this meeting is: “Bug Bounty Programs and how they are shaping Threat Research”
Nearly every company claims to do threat intelligence and vulnerability research, but what does that really mean? Different marketplaces exist for security research and the current black and gray markets can be as robust as their white market counterparts. At each stage of the process, information about the vulnerability equates to a monetary value and depending on how this information is disseminated, that monetary value can drastically change. Like any open market, different factors can spur changes in supply and demand, and market actors can shape what types of research either become public – or finds its way into an active exploit.
Even if you don’t actively join in the exploit economy, it impacts the security of your company. The most obvious way this manifests is through security patches that result from submissions to bug bounty programs, but other factors have wide-reaching impacts. Understanding the source of threat intelligence and the exploit economy is vital for getting proactive with your network defenses rather than merely reacting to threats.