The Law of 'Sploits
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the legal landscape surrounding exploits and vulnerabilities in this thought-provoking Black Hat USA 2003 conference talk. Delve into the complex intersection of cybersecurity and law as Jennifer Stisa Granick examines the legal implications of discovering, disclosing, and utilizing software vulnerabilities. Gain insights into the potential legal risks and ethical considerations faced by security researchers, penetration testers, and hackers. Analyze the evolving legal framework governing exploit development and disclosure, and understand how it impacts the cybersecurity industry. Discover the challenges in balancing security research with legal compliance, and learn about the potential consequences of running afoul of relevant laws. Equip yourself with valuable knowledge to navigate the intricate legal terrain surrounding exploit research and disclosure in the ever-changing world of information security.
Syllabus
Black Hat USA 2003 - The Law of 'Sploits
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube