Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.
Implement stronger third party vendor and supply chain cybersecurity risk mitigation tactics today!
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Expand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Tai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.
Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.
JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Zero trust, supply chain security and DevSecOps.