Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... 7 months ago | 59 mins An Insider’s Guide to SPDX Gary O’Neall, Co-Lead, SPDX Tech Team | Founder, Source Auditor SPDX (Software Packet Data Exchange) is a widely used software bill of materials (SBOM) specification. It’s one of two full-stack SBOM standards appro... June 13, 2023 6:00pm From Mandate to Execution: Building a Modern Cybersecurity Strategy Sponsored by Cribl Cyber-attacks are becoming more and more uninhibited and boundless, which means cybersecurity efforts must evolve their complexities to be able to kee... 1 week ago | 42 mins STRONGER 2022: Executive Orders Mandating the NIST Cybersecurity Framework Mike Battistella, President of Solutions³ | Blake Curtis, Global Cybersecurity Optimization Manager, Deloitte In this STRONGER 2022 presentation, the presenters provided an overview of the Executive Order (EO) and discussed the impact of and long-term benefits... 6 months ago | 46 mins Cybersecurity Executive Order: Essential Insight for Agency Implementation Ryan Kovar, Distinguished Security Strategist | Paul Kurtz, Chief Cybersecurity Advisor | Drew Church, Sr Security Strategist Federal staff are under increasing pressure to modernize their security operations and fortify networks. To address the recurring and future cyber thr... 10 months ago | 52 mins Aligning Cybersecurity Best Practices with Third-Party Risk Hananel Livneh, Adaptive Shield; Alastair Parr, Prevalent; Matt Bianchi, ProcessUnity; and Shea Hanson, OneTrust. The cyber threat landscape grows exponentially each year. Third-party cyber data breaches like the Kaseya data breach, a cyberattack that affected ove... 4 months ago | 74 mins From Mandate to Execution: Building a Modern Cybersecurity Strategy Sponsored by Cribl Cyber-attacks are becoming more and more uninhibited and boundless, which means cybersecurity efforts must evolve their complexities to be able to kee... 4 months ago | 42 mins Demystifying NIST’s Open Source Software Security Controls Solomon Rubin, Engineering Manager - Security, FOSSA | Gauthami Polsani, Product Marketing Manager, FOSSA There's been a lot of discussion about SBOM-related requirements in the Biden administration’s 2021 cybersecurity executive order. But that same execu... 8 months ago | 35 mins Countermeasures for Cyber Defenders: 2023 SonicWall Cyber Threat Report Suroop Chandran, Executive Director Product Management Join SonicWall's Threat Detection and Response Strategist as he dives into the 2023 SonicWall Cyber Threat Report, covering the importance of implemen... 3 months ago | 38 mins President Biden’s Executive Order on U.S. Signals Intelligence Activities Linda V. Priebe, JD, CIPP/E is Partner and Chair of Culhane Meadows President Biden’s Executive Order on U.S. Signals Intelligence Activities for EU-U.S. Data Transfers: Is it Adequate for the EU? Since the EU-U.S. P... 5 months ago | 57 mins Load more