From 685444f33b86efbb3c22a595f7543be21c67edbb Mon Sep 17 00:00:00 2001 From: fd0-nl Date: Thu, 2 May 2024 15:40:03 +0200 Subject: [PATCH] typo removed --- ...e-tools-for-enhanced-it-security-vulnerability-assessment.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/evenementen/nluug/voorjaarsconferentie-2024/talks/joost-grunwald-patrick-kuin-harnessing-ai-and-open-source-tools-for-enhanced-it-security-vulnerability-assessment.md b/content/evenementen/nluug/voorjaarsconferentie-2024/talks/joost-grunwald-patrick-kuin-harnessing-ai-and-open-source-tools-for-enhanced-it-security-vulnerability-assessment.md index 95f0739..7b7f895 100644 --- a/content/evenementen/nluug/voorjaarsconferentie-2024/talks/joost-grunwald-patrick-kuin-harnessing-ai-and-open-source-tools-for-enhanced-it-security-vulnerability-assessment.md +++ b/content/evenementen/nluug/voorjaarsconferentie-2024/talks/joost-grunwald-patrick-kuin-harnessing-ai-and-open-source-tools-for-enhanced-it-security-vulnerability-assessment.md @@ -27,7 +27,7 @@ In conclusion, this research highlights the benefits of harnessing AI and open-s ### Joost Grunwald -As a security enthousiast, I have always been fascinated by finding vulnerabilities, manually, but also automatically, because of scale and because I am only able to spent my time once. +As a security enthousiast, I have always been fascinated by finding vulnerabilities, manually, but also automatically, because of scale and because I am only able to spend my time once. I have two cybersecurity related companies in which I do a lot of pentesting and love building systems related to vulnerability management or SIEM/IDS/etc.