
Sign up to save your podcasts
Or


In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.
By Hogan Lovells4.6
1010 ratings
In this episode of The Data Chronicles, host Scott Loughlin is joined by Hogan Lovells senior associate Dan Ongaro to explore security researchers, in particular, how they differ from threat actors and best practices for handling security researchers effectively. Discussion includes bug bounties and other vulnerability disclosure programs to help organizations remain secure and responsive to legal implications of security researchers such as when researchers cross the line to potential incidents or breaches.

2,006 Listeners

68 Listeners

416 Listeners

613 Listeners

179 Listeners

353 Listeners

1,076 Listeners

390 Listeners

519 Listeners

139 Listeners

5,522 Listeners

15,616 Listeners

47 Listeners

391 Listeners

2 Listeners