It’s no secret that the cybersecurity landscape has changed significantly. Adversaries advance their predatory skills by developing and using ever more sophisticated hacks that, once inside a gateway, can compromise any or all data within the network, even hold it hostage for ransom. This session begins with an overview of the efforts, challenges, and lessons learned while performing incident response and vulnerability disclosure.
The discussion will include details on building an efficient vendor incident response process using modern ways to disclose vulnerabilities to customers and users in a more effective manner, including the latest application programmable interfaces (APIs) and machine readable content. You’ll also hear details about a new initiative called the Common Security Advisory Framework (CSAF), and how it can reduce and/or resolve cybersecurity hacks.
Auditorium Borderless Cyber USA / New York / 21-22 June 2017 events@oasis-open.orgIt’s no secret that the cybersecurity landscape has changed significantly. Adversaries advance their predatory skills by developing and using ever more sophisticated hacks that, once inside a gateway, can compromise any or all data within the network, even hold it hostage for ransom. This session begins with an overview of the efforts, challenges, and lessons learned while performing incident response and vulnerability disclosure.
The discussion will include details on building an efficient vendor incident response process using modern ways to disclose vulnerabilities to customers and users in a more effective manner, including the latest application programmable interfaces (APIs) and machine readable content. You’ll also hear details about a new initiative called the Common Security Advisory Framework (CSAF), and how it can reduce and/or resolve cybersecurity hacks.