We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Supply Chain Security

Search

Clear Expand Collapse

A Modern Approach to Supply Chain Complexities

Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.

Price
Course duration Duration: 20 minutes

Advanced Supply Chain Risk Mitigation Strategies

Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.

Price
Course duration Duration: 30 minutes

Can You Outsource Your Cybersecurity Operations?

Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance

Price
Course duration Duration: 30 minutes

Decoding the Future of Software Supply Chain

The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.

Price
Course duration Duration: 30 Min.

Evolving a Third-Party Risk Management Program

Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.

Price
Course duration Duration: 25 minutes

Fault Injection and the Supply Chain

DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.

Price
Course duration Duration: 35 minutes

Is New U.S. National Cybersecurity Strategy Viable?

Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?

Price
Course duration Duration: 25 minutes

Leading Financial Supply Chain Cybersecurity Teams

Expand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!

Course duration Duration: 10 minutes

Mitigating Modern Cyberthreats From Third Parties

Tai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.

Price
Course duration Duration: 15 minutes

Our Framework for Securing Our Supply Chains

Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.

Price
Course duration Duration: 25 minutes

Overcoming a Breach to Our Supply Chain’s Cybersecurity

Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.

Price
Course duration Duration: 35 minutes

Securing Supply Chains for Operational Resilience

Marc Muntañá Vergés of CaixaBank shares insights on building operational resilience through supply chain security and managing third-party risk across more than 2,000 providers in today's complex regulatory environment.

Course duration Duration: 35 minutes

Software Supply Chain Security

Abhisek Datta of SafeDep, Cassie Crossley of Schneider Electric and Sanjay Bahl of CERT-In address supply chain attacks, SBOM implementation, third-party component risks and global policy impacts.

Price
Course duration Duration: 30 minutes

Supply Chain Attacks

JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.

Price
Course duration Duration: 30 minutes

Supply Chain Security of Electronics Systems: Threats, Mitigations and Emerging Regulations

Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.

Price
Course duration Duration: 25 minutes

The Future of Ransomware & Evolving Attacks

Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.

Course duration Duration: 30 minutes

The Rising Complexities of Software Supply Chain

Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.

Price
Course duration Duration: 15 minutes

Third-Party Risk & Emerging Supply Chain Threats

Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.

Price
Course duration Duration: 30 minutes

Zero Trust, The DoD & You

Zero trust, supply chain security and DevSecOps.

Course duration Duration: 40 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement