Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the intersection of bug bounty programs with European cybersecurity regulations in this 31-minute conference talk that examines how NIS2 (Network and Information Systems Directive), DORA (Digital Operational Resilience Act), and CRA (Cyber Resilience Act) impact vulnerability disclosure practices. Learn how these regulatory frameworks shape the legal and operational landscape for bug bounty initiatives, understand compliance requirements for organizations implementing coordinated vulnerability disclosure programs, and discover practical strategies for aligning bug bounty activities with regulatory obligations. Gain insights into the evolving relationship between crowdsourced security testing and European cybersecurity legislation, including risk management considerations and best practices for maintaining regulatory compliance while leveraging external security researchers.
Syllabus
Bug Bounty aus Sicht von NIS2, DORA und CRA - Andreas Schneider
Taught by
Cooper