Behind the Curtain - Safe Harbor and Department of Defense
Offered By: Bugcrowd via YouTube
Course Description
Overview
Explore the intricacies of vulnerability disclosure and legal protections in this panel discussion featuring experts from the Department of Defense and legal field. Delve into the DoD's vulnerability submission process, internal handling procedures, and processing timelines. Gain insights on Safe Harbor policies, the DoJ framework's core principles, and how the DoD is leading the movement for improved legal protections in vulnerability research. Learn about best practices for security researchers when submitting vulnerabilities, recent legal developments in computer fraud cases, and emerging trends in bug bounty programs. Discover the concept of Disclose.io and its implications for the future of federal vulnerability reporting. Understand the challenges of third-party testing and get expert advice on navigating the evolving landscape of cybersecurity research and disclosure.
Syllabus
Behind the Curtain: Safe Harbor and Department of Defense
Taught by
Bugcrowd
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network