Главная
Study mode:
on
1
Introduction
2
Vulnerability disclosure
3
National and international efforts
4
How does it work
5
Bug bounties
6
Hackers are not scary
7
The law can still be involved
8
The hospital
9
The disclosure
10
KP
11
Wrapping up
12
The once entire arrangement
13
The crypto Wars
14
Intrusion Software
Description:
Explore the complexities of vulnerability disclosure in cybersecurity through this 38-minute conference talk by Jeroen van der Ham at Hack.lu 2017. Delve into the evolution of vulnerability disclosure practices from the 90s to the present, examining the rise of bug bounty programs and government involvement. Gain insights into how vulnerability disclosure has influenced EU policy-making, including debates on GDPR and the NIS directive. Understand the impact of high-level policy discussions on export control and dual-use goods in the international Wassenaar Arrangement. Learn about the intersection of policy-making with security and incident response, and consider ways to advance this field. Benefit from van der Ham's expertise as a security researcher at NCSC-NL, focusing on privacy, security, and ethics in security research.

Vulnerability Disclosure, Governments and You

Cooper
Add to list
0:00 / 0:00