Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the intersection of bug bounty programs with European cybersecurity regulations in this 31-minute conference talk that examines how NIS2 (Network and Information Systems Directive), DORA (Digital Operational Resilience Act), and CRA (Cyber Resilience Act) impact vulnerability disclosure practices. Learn how these regulatory frameworks shape the legal and operational landscape for bug bounty initiatives, understand compliance requirements for organizations implementing coordinated vulnerability disclosure programs, and discover practical strategies for aligning bug bounty activities with regulatory obligations. Gain insights into the evolving relationship between crowdsourced security testing and European cybersecurity legislation, including risk management considerations and best practices for maintaining regulatory compliance while leveraging external security researchers.
Syllabus
Bug Bounty aus Sicht von NIS2, DORA und CRA - Andreas Schneider
Taught by
Cooper