
Sign up to save your podcasts
Or


In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.
By Hogan Lovells4.6
1010 ratings
In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.

1,896 Listeners

9,485 Listeners

1,637 Listeners

66 Listeners

112,584 Listeners

673 Listeners

5,499 Listeners

387 Listeners

9,918 Listeners

137 Listeners

5,470 Listeners

20,377 Listeners

384 Listeners

4 Listeners