Bill Hardin is a panelist during this CLE-accredited seminar. The panel of veteran investigators will discuss best practices in data breach investigation and strategies and will share war stories, using real life examples to illustrate successful structured data projects.
For more information on this event, click here.
“Bug bounty” demands: legal bane or information security boon?
A “bug bounty” request occurs when a self-described security researcher contacts a company, claiming to have discovered an information security vulnerability,...