SlideShare a Scribd company logo
Welcome to the blue team… 

(How building a better hacker accidentally
built a better defender)
Casey Ellis - Converge Detroit 2014
About me
@caseyjohnellis
JABAH (Just Another Blonde Aussie Hacker)
Recovering pentester turned solution architect turned sales guy turned
entrepreneur
Wife and two kids now living in San Francisco
Founder and CEO of Bugcrowd
Before we begin…
• I’m not here to sell you anything.
• Let’s be real.
• I’m not a developer. I’m a 100% breaker. So I’m
speaking to security folks in front of developers.
This will hopefully help all of you.
Who’s who
• Who here builds for a living?
• Who here breaks for a living?
• Who does both? Seriously? You poor bugger.
You’re different.
Very different actually… 

and we don’t want to change that.
Builders Breakers
Say what?
You’re paid to do completely
the opposite things.
Welcome to the blue team! How building a better hacker accidentally built a better defender.
Developer Incentive
Push this feature by this 

deadline because $REASON.
Security Incentive
Make sure dev doesn’t do anything "
that lets the bad guys in.
Side note:
• Those who think like bad guys *greatly*
overestimate the ability for everyone else to think
like a bad guy.
• Doesn’t make security people “better”. Does make
us useful (and really, really annoying).
• Tip: The next time you feel like calling a developer
“dumb”, build and launch a product first.
Developer Problem
All this security shit 

slows us down
Security Problem
Why won’t they take "
me seriously?
Side note:
• Development contributes to products which make
money. No dev = no product = no money = no job
= no beuno.
• Security minimizes risk of loss. No security = More
risk… but *maybe* nothing will happen.
• This driver for prioritization happens all. the. time.
The real developer problem
I don’t believe in 

the boogeyman
The real security problem
I don’t have the time/energy/people skills/resources "
to convince you that the boogeyman is real.
Side note:
• Thanks to every security vendor ever for making
this even harder.
• FUD works, but FUD fatigue is real.
Status quo
• Developer checklists
• Check-in testing/CI tests
• Security awareness training
• Pentesting/VA/outsourced things
BLOCKERS
So we do this…
(and let’s be honest, we quite enjoy it too…)
It doesn’t work over the long
term.
How do we get developers
to believe in the
boogeyman?
Boogeyman awareness
>
Annoying checklist
Pickard Management Tip
The McAfee Version
The most security aware an organization will ever be is straight after a breach.
*not a John McAfee quote, but he’s burning benjamin’s in this pic because it’s true.
That’s nice, but
how do I avoid
the whole
“getting pwned”
bit?
Bug bounty!!!
FOREVER!!!
Pics from @alliebrosh
http://hyperboleandahalf.blogspot.com/2010/06/this-is-why-ill-never-be-adult.html
What’s a bug bounty program?
History
0
125
250
375
500
1995 2000 2005 2010 2015
It’s not just about being
cheap, or loud…
It’s about leveling the
playing field…
…and about introducing your
devs to this guy.
Egor Homakov (@homakov)
aka “that guy who totally owned
Github that time”
!
Good guy who thinks like a bad guy
!
“I wonder what his next-door
neighbor can do?”
Bug bounties create
controlled incidents…
… like having your code owned
by an 18yo kid.
Mozilla
Thanks to @mwcoates
http://www.slideshare.net/michael_coates/bug-bounty-programs-for-the-web
Two other “non-slide”
examples
An idea: Gamify your SDLC
• Create a pot that benefits your dev team (team
drinks, party, event, whatever) and have bug
bounties paid from it. What ever the hackers don’t
get, the devs keep.
• Level up: Pilot it with internal teams.
Ready to start?
Bug bounties are awesome…
…but hard.
The Golden Rule:
!
Touch the code
==
reward the bug
The mistake *everyone* makes:
!
VULNERABILITY DATA
PEOPLE
Conclusion
• Bug bounties are cost effective, and highly
marketable… but that’s not the full story…
• …the psychology of external disclosure is
completely different to internal security training,
and it’s extremely effective.
• Go start one.
• More tips and tricks at https://blog.bugcrowd.com
Questions?
@caseyjohnellis
https://bugcrowd.com
casey@bugcrowd.com
!
Greets to Wolf, @jimmyvo and Converge crew, builditsecure.ly,
Rapid7, iamthecavalry.com, @treyford, @quine, @markstanislav,
@alliebrosh, @mwcoates, @homakov, @codesoda and the
@bugcrowd team.

More Related Content

PDF
Fail Safe, Fail Smart, Succeed
Kevin Goldsmith
 
PDF
Continuous Delivery Sounds Great but it Won't Work Here
Jez Humble
 
PDF
Continuous Delivery
Jez Humble
 
PDF
Use Scrum and Continuous Delivery to innovate like crazy!
Peter Gfader
 
PPT
FOWA Miami 2009 Highlights for WPB Web Meetup Monday
John Gills
 
PDF
Failing Up - Creating a Failsafe Environment
Kevin Goldsmith
 
PDF
Alex Bolboacă: Usable Software Design at I T.A.K.E. Unconference 2015
Mozaic Works
 
PDF
15 Explosive Things You Should Try As An Agilist by Peter Gfader
Bosnia Agile
 
Fail Safe, Fail Smart, Succeed
Kevin Goldsmith
 
Continuous Delivery Sounds Great but it Won't Work Here
Jez Humble
 
Continuous Delivery
Jez Humble
 
Use Scrum and Continuous Delivery to innovate like crazy!
Peter Gfader
 
FOWA Miami 2009 Highlights for WPB Web Meetup Monday
John Gills
 
Failing Up - Creating a Failsafe Environment
Kevin Goldsmith
 
Alex Bolboacă: Usable Software Design at I T.A.K.E. Unconference 2015
Mozaic Works
 
15 Explosive Things You Should Try As An Agilist by Peter Gfader
Bosnia Agile
 

What's hot (12)

PDF
Continuous Testing With React Storybook & WebdriverIO
Josh Cypher
 
PDF
A Startup Story - Geekcamp Presentation
Arun Thampi
 
PDF
From DevOps to NoOps how not to get Equifaxed Apidays
Ori Pekelman
 
PDF
From 🤦 to 🐿️
Ori Pekelman
 
PDF
Data Driven DevOps
Leon Stigter
 
PDF
Lean Startup: How Development Looks Different at a Startup
Abby Fichtner
 
PDF
Matt Heusser - Keynote - Cool New Things... and some old ones too
QA or the Highway
 
PDF
Failure the-good-parts
legendofklang
 
PPTX
Trends in Agile Software
Steve Rogalsky
 
PPT
Lean Startup at IGN - presentation at SLLCONF 2011
Eric Ries
 
PDF
Startup Engineering culture - "What matters & what does not"
Mohan Krishnan
 
PDF
Making operations visible - devopsdays tokyo 2013
Nick Galbreath
 
Continuous Testing With React Storybook & WebdriverIO
Josh Cypher
 
A Startup Story - Geekcamp Presentation
Arun Thampi
 
From DevOps to NoOps how not to get Equifaxed Apidays
Ori Pekelman
 
From 🤦 to 🐿️
Ori Pekelman
 
Data Driven DevOps
Leon Stigter
 
Lean Startup: How Development Looks Different at a Startup
Abby Fichtner
 
Matt Heusser - Keynote - Cool New Things... and some old ones too
QA or the Highway
 
Failure the-good-parts
legendofklang
 
Trends in Agile Software
Steve Rogalsky
 
Lean Startup at IGN - presentation at SLLCONF 2011
Eric Ries
 
Startup Engineering culture - "What matters & what does not"
Mohan Krishnan
 
Making operations visible - devopsdays tokyo 2013
Nick Galbreath
 

Similar to Welcome to the blue team! How building a better hacker accidentally built a better defender. (20)

PDF
NodeSummit 2016 - WELCOME TO THE BLUE TEAM! CREATING “OH SHIT” MOMENTS FOR FU...
Casey Ellis
 
PDF
Owasp LA
leifdreizler
 
PDF
[Webinar] The Art & Value of Bug Bounty Programs
bugcrowd
 
PDF
Year Zero
leifdreizler
 
PDF
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
PDF
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
PDF
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
PDF
Building a Modern Security Engineering Organization
Zane Lackey
 
PPTX
ABCD of Bugbounty.pptx
Md Atikqur Rahman
 
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
PDF
Building a Modern Security Engineering Organization. Zane Lackey
Yandex
 
PDF
The Most Important Thing: How Mozilla Does Security and What You Can Steal
mozilla.presentations
 
PDF
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Nick Galbreath
 
PDF
Work with Developers for Fun and Progress - AppSec California
leifdreizler
 
PDF
HACKER-POWERED SECURITY REPORT
E.S.G. JR. Consulting, Inc.
 
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
PDF
Yet another talk on bug bounty
vinoth kumar
 
PPTX
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
PDF
Bug Bounty Hunter's Manifesto V1.0
Dinesh O Bareja
 
PDF
CrikeyCon 2017 - Rumours of our Demise Have Been Greatly Exaggerated
eightbit
 
NodeSummit 2016 - WELCOME TO THE BLUE TEAM! CREATING “OH SHIT” MOMENTS FOR FU...
Casey Ellis
 
Owasp LA
leifdreizler
 
[Webinar] The Art & Value of Bug Bounty Programs
bugcrowd
 
Year Zero
leifdreizler
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
Building a Modern Security Engineering Organization
Zane Lackey
 
ABCD of Bugbounty.pptx
Md Atikqur Rahman
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
Building a Modern Security Engineering Organization. Zane Lackey
Yandex
 
The Most Important Thing: How Mozilla Does Security and What You Can Steal
mozilla.presentations
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Nick Galbreath
 
Work with Developers for Fun and Progress - AppSec California
leifdreizler
 
HACKER-POWERED SECURITY REPORT
E.S.G. JR. Consulting, Inc.
 
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
Yet another talk on bug bounty
vinoth kumar
 
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
Bug Bounty Hunter's Manifesto V1.0
Dinesh O Bareja
 
CrikeyCon 2017 - Rumours of our Demise Have Been Greatly Exaggerated
eightbit
 

More from Casey Ellis (20)

PDF
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Casey Ellis
 
PDF
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”
Casey Ellis
 
PDF
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
Casey Ellis
 
PDF
Bug bounty or beg bounty?
Casey Ellis
 
PDF
ACRNA Webinar #5: Cyber Security – The Unlikely Romance
Casey Ellis
 
PDF
Corncon 2021 - Inside the Unlikely Romance
Casey Ellis
 
PDF
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
Casey Ellis
 
PDF
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
Casey Ellis
 
PDF
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
Casey Ellis
 
PDF
TechCrunch Early Stage 2020 - How to prioritize security at your startup
Casey Ellis
 
PDF
GRIMMCon: disclose.io - Taking the Internet's Immune System to the Next Level
Casey Ellis
 
PDF
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
Casey Ellis
 
PDF
Full Disclosure Debate - NBT 5
Casey Ellis
 
PDF
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
Casey Ellis
 
PDF
Webinar kym-casey-bug bounty tipping point webcast - po edits
Casey Ellis
 
PPTX
AppSecUSA - Your License for Bug Hunting Season
Casey Ellis
 
PDF
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
Casey Ellis
 
PDF
Introducing Bugcrowd
Casey Ellis
 
PPTX
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
Casey Ellis
 
PDF
Enigma 2018 - Combining the Power of Builders and Breakers
Casey Ellis
 
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Casey Ellis
 
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”
Casey Ellis
 
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
Casey Ellis
 
Bug bounty or beg bounty?
Casey Ellis
 
ACRNA Webinar #5: Cyber Security – The Unlikely Romance
Casey Ellis
 
Corncon 2021 - Inside the Unlikely Romance
Casey Ellis
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
Casey Ellis
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
Casey Ellis
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
Casey Ellis
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
Casey Ellis
 
GRIMMCon: disclose.io - Taking the Internet's Immune System to the Next Level
Casey Ellis
 
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
Casey Ellis
 
Full Disclosure Debate - NBT 5
Casey Ellis
 
KEYNOTE: The Unlikely Romance: Part 2 - What Now?
Casey Ellis
 
Webinar kym-casey-bug bounty tipping point webcast - po edits
Casey Ellis
 
AppSecUSA - Your License for Bug Hunting Season
Casey Ellis
 
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
Casey Ellis
 
Introducing Bugcrowd
Casey Ellis
 
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
Casey Ellis
 
Enigma 2018 - Combining the Power of Builders and Breakers
Casey Ellis
 

Recently uploaded (20)

PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Software Development Methodologies in 2025
KodekX
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 

Welcome to the blue team! How building a better hacker accidentally built a better defender.