Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions

1 year ago 61
BOOK THIS SPACE FOR AD
ARTICLE AD

Hi, what are you looking for?

SecurityWeekSecurityWeek

SecurityWeekSecurityWeek

SecurityWeek

Supply Chain Security

Join us for the virtual experience as we bring together security experts to discuss the complex nature of the supply chain problem, best practices for mitigating security issues.

Supply Chain Security Summit

SecurityWeek’s Supply Chain & Third-Party Risk Summit took place on Wednesday, March 22nd. All sessions are now available to watch instantly on demand.

Login to the virtual event platform to view sessions that discuss the complex nature of the supply chain problem, best practices for mitigating security issues, and the frameworks and specifications available..

Featured sessions and topics available to watch include:

Trust in Software has Eroded How to Leverage SBOMs to Reduce Software Supply Chain Risk Securing The Digital Supply Chain: Do You Trust Your Devices? Tech Session – Compromised Enterprise-Grade Routers and Downstream Supply Chain Risks From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise The Hidden Threat in Your Third-Party Risk Management Program Protecting Beyond the OS – The Hardware and Firmware Integrity Journey Fireside Chat: Ivan Arce on the Supply Chain of Supply Chain Vulnerabilities Technical Demos, Virtual Expo Hall and Much more!

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Related Content

Supply Chain Cybersecurity Supply Chain Cybersecurity

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

 ICS and Operational Technology  ICS and Operational Technology

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

The Five Stories That Shaped Cybersecurity in 2022

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Oracle’s First Security Update for 2023 Includes 327 New Patches

Supply Chain Security

Oracle's Critical Patch Update for January 2023 includes 327 patches, with more than 70 that address critical-severity vulnerabilities.

 Analysis

Supply Chain Security

A new report found that 98% of organizations have a relationship with a third party that has been breached, while more than 50% have...

Software Supply Chain Security Firm Lineaje Raises $7 Million

Cybersecurity Funding

Software supply chain security management startup Lineaje raises $7 million in a seed funding round led by Tenable Ventures.

SBOMs SBOMs

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

SBOMs SBOMs

Supply Chain Security

Endor Labs has introduced an OWASP-style listing of the most important or impactful risks inherent in the use of open source software (OSS).

Read Entire Article