Posted on
in Presentations
Examples abound of clashes between security researchers and companies over disclosing software flaws, yet there is little quantifiable data delving into vulnerability disclosure. With the help of new research data on coordinated disclosure, this presentation will focus on the views of security researchers and organizations alike to highlight behaviors, preferences and established practices.
Pre-Requisites: Understanding of vulnerability disclosure processes and policies.
Policy & Government Open Source Tools DevSecOps & Application Security Analytics Intelligence & Response
software code vulnerability analysis security operations policy management incident response
Topic
Policy & Government
Open Source Tools
DevSecOps & Application Security
Analytics Intelligence & Response
Subtopic
software code vulnerability analysis
security operations
policy management
incident response
Share With Your Community