This repository was archived by the owner on Oct 15, 2024. It is now read-only.
File tree 3 files changed +19
-1
lines changed
3 files changed +19
-1
lines changed Original file line number Diff line number Diff line change 34
34
"role" : " dlab" ,
35
35
"imageURL" : " /events/SaiboGeng.jpg" ,
36
36
"websiteURL" : " https://people.epfl.ch/saibo.geng"
37
+ },
38
+ {
39
+ "name" : " Paul Rolland" ,
40
+ "role" : " SDSC" ,
41
+ "imageURL" : " /events/PaulRolland.jpg" ,
42
+ "websiteURL" : " https://people.epfl.ch/paul.rolland"
43
+ },
44
+ {
45
+ "name" : " Isinsu Katircioglu" ,
46
+ "role" : " SDSC" ,
47
+ "imageURL" : " /img/icbd/icbd_logo.png" ,
48
+ "websiteURL" : " https://people.epfl.ch/isinsu.katircioglu"
49
+ },
50
+ {
51
+ "name" : " Corinne Jones" ,
52
+ "role" : " SDSC" ,
53
+ "imageURL" : " /img/icbd/icbd_logo.png" ,
54
+ "websiteURL" : " https://people.epfl.ch/corinne.jones"
37
55
}
38
56
]
Original file line number Diff line number Diff line change 406
406
<div class =" details" >
407
407
<h4 >Cybersecurity</h4 >
408
408
<p >
409
- Florian Badertscher is co-founder of Bug Bounty Switzerland and uses ethical hacking to identify cyber vulnerabilities.
409
+ Florian Badertscher and Gaiëtan Renault work at Bug Bounty Switzerland and use ethical hacking to identify cyber vulnerabilities.
410
410
Discover why there is no way around ethical hackers when it comes to securing digital systems, how such a collaboration
411
411
with ethical hackers looks like, and the different roles and career possibilities involved. Learn how this proactive
412
412
approach eliminates the breeding ground for cyber-attacks and how you can be part of it.
You can’t perform that action at this time.
0 commit comments