Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Zero trust, supply chain security and DevSecOps.
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Tai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.
Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.
Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.
Abhisek Datta of SafeDep, Cassie Crossley of Schneider Electric and Sanjay Bahl of CERT-In address supply chain attacks, SBOM implementation, third-party component risks and global policy impacts.
Kashif Parvaiz demonstrates how to secure third-party relationships through procurement integration, risk assessment methods and evaluation approaches for healthcare and critical infrastructure.
John Nayagam and Don Gibson examine how financial institutions can move beyond compliance theater to risk-based supplier assessment while extending zero trust principles to third-party relationships.
Imran Khan examines the latest supply chain attack tactics, revealing hidden vulnerabilities in vendor relationships and third-party dependencies that can lead to catastrophic breaches in financial services.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.
James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.
Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.
Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.
Nico Martinez and Jan Indra of Resistant AI discuss how openly accessible template farms sell forged documents at scale, how AI-powered forgery and data breaches challenge fraud controls, and how to combat industrialized document fraud.
Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.
Muyiwa Olufon, Pieter Van Goethem and Fred Pintchman share insights on mapping suppliers to business processes for priority-based risk assessment, using retrieval-augmented AI to harvest audit rights and balancing operational efficiency.
Singuyen Vo explores continuous life cycle vigilance for OT supply chain risk management. He discusses threat-informed vetting, SBOM documentation and behavioral monitoring during operations.