Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Expand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Tai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.
Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.
Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.
Marc Muntañá Vergés of CaixaBank shares insights on building operational resilience through supply chain security and managing third-party risk across more than 2,000 providers in today's complex regulatory environment.
Abhisek Datta of SafeDep, Cassie Crossley of Schneider Electric and Sanjay Bahl of CERT-In address supply chain attacks, SBOM implementation, third-party component risks and global policy impacts.
JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.
Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Zero trust, supply chain security and DevSecOps.