Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program. Use swimlanes to identify and list relevant stakeholders and their responsibilites.
Coordinated Vulnerability Disclosure Workflow
2 Downloads
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
View the Complete Blueprint:
Design a Coordinated Vulnerability Disclosure Program
Because it's likely tomorrow’s law.