SecurityWeek’s Supply Chain & Third-Party Risk Summit took place on Wednesday, March 22nd. All sessions are now available to watch instantly on demand.
Login to the virtual event platform to view sessions that discuss the complex nature of the supply chain problem, best practices for mitigating security issues, and the frameworks and specifications available..
Featured sessions and topics available to watch include:
- Trust in Software has Eroded
- How to Leverage SBOMs to Reduce Software Supply Chain Risk
- Securing The Digital Supply Chain: Do You Trust Your Devices?
- Tech Session – Compromised Enterprise-Grade Routers and Downstream Supply Chain Risks
- From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise
- The Hidden Threat in Your Third-Party Risk Management Program
- Protecting Beyond the OS – The Hardware and Firmware Integrity Journey
- Fireside Chat: Ivan Arce on the Supply Chain of Supply Chain Vulnerabilities
- Technical Demos, Virtual Expo Hall and Much more!

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
