
Sign up to save your podcasts
Or
In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.
5
99 ratings
In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.
3,135 Listeners
1,014 Listeners
64 Listeners
314 Listeners
6,721 Listeners
165 Listeners
709 Listeners
395 Listeners
118 Listeners
5,356 Listeners
13 Listeners
5 Listeners
3,129 Listeners
427 Listeners
1 Listeners