Katie Moussouris: Vulnerability Disclosure and Security Workforce Development

被引:1
|
作者
Blakley, Bob
Cranor, Lorrie
机构
关键词
Compendex;
D O I
10.1109/MSEC.2022.3222043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bob Blakley: Welcome everyone to episode four of the IEEE Over the Rainbow podcast. I'm Bob Blakley, and I'm here with my cohost Lorrie Cranor. Our guest today is Katie Moussouris. Katie is the CEO of Luta Security, a company that helps organizations design and operate bug bounty and vulnerability reporting programs. Katie has a background in molecular biology and worked on the Human Genome Project at MIT. While she was at MIT, she became a system administrator, which led her in time to a career in information security. She was a penetration tester for @Stake; after Symantec acquired @Stake, she established the Symantec Vulnerability Research Program. From Symantec, she moved to Microsoft, where she created Microsoft's Vulnerability Research Program in 2008; in 2014, Katie moved to HackerOne, where she served as chief policy officer. In 2016, she left HackerOne to found Luta Security. Katie has done both academic and policy work in vulnerability research and disclosure; she was a driving force in ensuring that the 2013 revision of the Wassenaar Arrangement would exempt software tools used for defense from export controls, and she served as editor of both major ISO/IEC vulnerability standards (ISO/IEC 29147 and ISO/IEC 30111).
引用
收藏
页码:11 / 18
页数:8
相关论文
共 50 条
  • [21] Building security for the new workforce
    Horowitz, S
    GLOBAL COMPETITION AND THE AMERICAN EMPLOYMENT LANDSCAPE: AS WE ENTER THE 21ST CENTURY, 2000, : 99 - 103
  • [22] Anatomy of the Information Security Workforce
    Lee, JinKyu
    Bagchi-Sen, Sharmistha
    Rao, H. Raghav
    Upadhyaya, Shambhu J.
    IT PROFESSIONAL, 2010, 12 (01) : 14 - 23
  • [23] Information Disclosure as a Means to Security
    Rabinovich, Zinovi
    Jiang, Albert Xin
    Jain, Manish
    Xu, Haifeng
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 645 - 653
  • [24] NETWORK SECURITY AND VULNERABILITY
    NYE, JM
    AFIPS CONFERENCE PROCEEDINGS, 1983, 52 : 647 - &
  • [25] MARITIME VULNERABILITY AND SECURITY
    MAIMONE, E
    TERRORISM, 1987, 10 (03): : 233 - 236
  • [26] Security against compelled disclosure
    Brown, I
    Laurie, B
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 2 - 10
  • [27] An effective computational technique for taxonomic position of security vulnerability in software development
    Srivastava, Amit Kumar
    Kumar, Shishir
    JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 388 - 396
  • [28] Workforce Development
    不详
    MANUFACTURING ENGINEERING, 2015, 154 (06): : 25 - 25
  • [29] Cyber Vulnerability Disclosure Policies for the Smart Grid
    Hahn, Adam
    Govindarasu, Manimaran
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [30] Improving Internet of Things Vulnerability Disclosure and Coordination
    Berte, Dan-Radu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2023, 17 (01): : 959 - 968