Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Supply Chain Security

Virtual Event Today: Supply Chain & Third-Party Risk Summit

Join us for the virtual experience as we bring together security experts to discuss the complex nature of the supply chain problem, best practices for mitigating security issues.

Supply Chain Security Summit

SecurityWeek’s Supply Chain & Third-Party Risk Summit takes place today in SecurityWeek’s virtual conference center.

Join us for the virtual experience as we bring together security experts to discuss the complex nature of the supply chain problem, best practices for mitigating security issues, and the frameworks and specifications available.

The first session kicks off today, Wednesday, March 22nd at 11AM ET, and is a fully immersive virtual conference and expo that you won’t want to miss.

Featured sessions and topics on the agenda include:

  • Trust in Software has Eroded
  • How to Leverage SBOMs to Reduce Software Supply Chain Risk
  • Securing The Digital Supply Chain: Do You Trust Your Devices?
  • Tech Session – Compromised Enterprise-Grade Routers and Downstream Supply Chain Risks
  • From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise
  • The Hidden Threat in Your Third-Party Risk Management Program
  • Protecting Beyond the OS – The Hardware and Firmware Integrity Journey
  • Technical Demos, Virtual Expo Hall and Much more!
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Supply Chain Security

Security researchers with NCC Group have documented 11 vulnerabilities impacting Nuki smart lock products, including issues that could allow attackers to open doors.Nuki offers...

Artificial Intelligence

Exposed data includes backup of employees workstations, secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages.

Government

Companies have announced securing billions of dollars in cybersecurity-related contracts with the United States government in 2022.

Supply Chain Security

SBOMs can be used for managing risk and determining vulnerability impact, but it’s very hard to build holistic risk models when the data is...

Application Security

Enterprise communication and collaboration platform Slack has informed customers that hackers have stolen some of its private source code repositories, but claims impact is...