{"id":293,"date":"2020-11-26T13:52:00","date_gmt":"2020-11-26T12:52:00","guid":{"rendered":"http:\/\/scpo-cybersecurityassociation.com\/?p=293"},"modified":"2021-12-12T14:02:14","modified_gmt":"2021-12-12T13:02:14","slug":"26-11-2020-bug-bounty-bridging-the-gap-between-coding-and-policy-making-with-rayna-stamboliyska","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2020\/11\/26\/26-11-2020-bug-bounty-bridging-the-gap-between-coding-and-policy-making-with-rayna-stamboliyska\/","title":{"rendered":"26\/11\/2020: Bug Bounty: Bridging the Gap between Coding and Policy-Making with Rayna Stamboliyska"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-14-1024x489.png\" alt=\"\" class=\"wp-image-294\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-14-1024x489.png 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-14-300x143.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-14-768x367.png 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-14.png 1256w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>At our digital conference with Rayna Stamboliyska, the VP of Governance and Public Affairs at YesWeHack &#8211; a global bug bounty and coordinated disclosure leader- we explored what bug bounty really is and why it is so important. She is a risk management and crisis mitigation expert with a focus on security governance, data protection and compliance.<\/p>\n\n\n\n<p>An award-winning author for her most recent book &#8220;La face cach\u00e9e d&#8217;Internet&#8221; (&#8220;The dark side of the Internet&#8221;, Larousse 2017), she is also an IoT hacker and a staunch proponent of open source, data, and science. She has consulted for international organisations, private companies, governments and non-profits,\u00a0interfacing with public sector actors and guiding them through innovative policy-making processes. Energetic and passionate, Ms Stamboliyska has grown to become a recognised information security speaker committed to educating those outside of the industry on security threats and best practices. She writes up the cybersecurity expert column &#8220;50 shades of Internet&#8221; at ZDNet.fr and tweets under @MaliciaRogue.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At our digital conference with Rayna Stamboliyska, the VP of Governance and Public Affairs at YesWeHack &#8211; a global bug bounty and coordinated disclosure leader- we explored what bug bounty really is and why it is so important. She is a risk management and crisis mitigation expert with a focus on security governance, data protection [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":294,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":2,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/293\/revisions\/308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/294"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}