1. Moscone South Esplanade

Examples abound of clashes between security researchers and companies over disclosing software flaws, yet there is little quantifiable data delving into vulnerability disclosure. With the help of new research data on coordinated disclosure, this presentation will focus on the views of security researchers and organizations alike to highlight behaviors, preferences and established practices.

Pre-Requisites: Understanding of vulnerability disclosure processes and policies.

Download pdf