Part 1 Vulnerability Disclosure Best Practices

Learn More

Vulnerabilities are a fact of life. But the consequences of exploits aren’t measured in downtime, they’re measured in millions of dollars — $3.86M according to IBM’s annual Cost of a Data Breach report — and lasting reputational damage. The good news is there is a movement happening – hundreds of thousands of hackers around the globe are hacking companies, not to steal information, but to secure vulnerabilities.

In this session, we will discuss the security evolution taking place in retail and hospitality, delve into key components of successful vulnerability disclosure with third parties, and top tips for engaging with hackers, pointing to success stories and data from leading retail and hospitality brands.

Part 2 Hacker-Powered Data

Security Weaknesses + Embracing Risk

Vulnerabilities are a fact of life. Today, technology companies, enterprises and even governments are embracing collaborating with hackers to find vulnerabilities before cyber criminals have a chance to exploit the same bugs for nefarious purposes. In this session, HackerOne will present data on the most common and critical vulnerabilities found in retail and hospitality companies. Attendees will discover common weaknesses that they won’t find on the OWASP top ten, how attackers could exploit these prevalent vulnerabilities, and the reason for some rising and falling in popularity. Whether you run an active bug bounty program or if your security email address is routed to /dev/null, this session will arm attendees with insights into the most common security weaknesses to better defend against them.

If you are interested in joining this discussion, please contact Amy Tate for more information.

Speaker: Will Kapcio

Part 3 TBD

More information coming soon.

More details coming soon.

Must be an RH-ISAC member to attend. For more information, contact Amy Tate, Program Director, RH-ISAC

your Speakers & Moderators

Speakers to be announced soon.