As the world grows ever more dependent on complex technological systems, the risk of broadly impactful vulnerabilities in sofware and hardware is driving the need for improvements in how the global ecosystem addresses identification and disclosure of those vulnerabilities. This panel will discuss what works, what doesn’t, and suggest a path forward that can benefit everyone.

Details

time: 14:50
speakers:

Other sessions:

Abuse mitigation: an integrated approach


Addressing Threats to Cyber Security in The Netherlands - Assessment - Ambition- Agenda


Professionalizing Incident Response & Network Defense Ethics, Standards and Self-Governance


Operating Large-scale Honeypot Sensor Networks For Fun and (non) Profit


Security for Safety, the holy grail of ICS is coming under attack