Overview
This course explores the future of cybersecurity, emphasizing the shift towards protecting our way of life rather than just secrets. It provides insights into evolving attack trends, the impact on policy landscapes, the role of trust, and the potential contributions of hackers. Students will learn about various topics such as bug bounty programs, vulnerability disclosure programs, legal considerations, and the importance of user decision-making. The teaching method includes lectures and real-world examples. This course is designed for individuals interested in cybersecurity, policy, technology, and the intersection of law and technology.
Syllabus
Introduction
Amit Irizarry
The Digital Way of Life
The Swiss Army Knife
Our Digital Universe
Regulation
Evolution
Autosploit
Hacking Back
Friendly Hackers
Bug Bounty Programs
Bug Bounty Contracts
Vulnerability Disclosure Programs
Legal Considerations
Applying Glynnis Law
User Decision Making
Turning Optimists into Paranoids
Women in Tech
Conclusion
Taught by
RSA Conference