Securing the Software Supply Chain – Binary Analysis and Open Source Security

Presented by

Lisa Bryngelson, Sr. Product Manager, Black Duck by Synopsys

About this talk

Organizations of all kinds increasingly rely on third-party software from their supply chain partners and outsourcers to power the products and technology they deliver to the marketplace. Whether you’re an automotive company or a medical device manufacturer, use of third-party software libraries is now commonplace and essential to success in the competitive global marketplace. One of the biggest challenges companies face with third-party software is they often have no visibility into the open source libraries being used in the software they embed in their products. Over the last year, a continuous stream of news stories has attributed major security breaches to exploits of vulnerabilities in open source frameworks used by Fortune 100 companies in education, government, financial services, retail and media. These incidents shine a light on the need for organizations to carefully manage the open source used in the third-party libraries they consumer in order to protect themselves—and their customers—from the consequences of catastrophic security breaches. Our webinar will arm you with the information and statistics needed to: -Explain the importance of open source security to your organization -Understand the key differences between identifying open source in source code vs. binaries -Define a clear road map for unearthing, managing, and securing the open source hiding in your software supply chain -Take the steps to help your company avoid becoming the next security breach media story

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (75)
Subscribers (6597)
We go beyond traditional application testing to empower you to build security into your software at every stage of your development process. We offer application testing and remediation expertise, guidance for structuring a software security initiative, training, and professional services for a proactive approach to application security.