Scott Solomon is speaking on a panel called “Effective Preparation Against Ransomware Attacks – A Case Study” during the second day of the summit.
CRA is a sponsor of the summit.
For more informaiton on this event, click here.
“Bug bounty” demands: legal bane or information security boon?
A “bug bounty” request occurs when a self-described security researcher contacts a company, claiming to have discovered an information security vulnerability,...