Finding vulnerabilities is easy. Addressing them - notifying vendors, developing mitigations, and getting actionable information to impacted owners of critical infrastructure, all before they become public and adversaries develop exploits - is harder. Discuss the status of public-private efforts. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
DevSecOps & Application Security Hackers & Threats
case studies exploit of vulnerability policy management software code vulnerability analysis zero day vulnerability
Share With Your Community