It’s Not Me, it’s You! Kicking 3rd-Party Software Risk to the Curb

Presented by

Ed Adams, CEO, Security Innovation

About this talk

With the proliferation of COTS, Open Source Software, libraries, frameworks, APIs, and other components, modern software is increasingly assembled instead of coded from scratch. While this shift helps deliver feature-rich solutions and interoperability, it also introduces risk and data security challenges. To manage 3rd-party risks, new assessment and mitigation techniques are needed. Fixing the code is often impossible, pen testing can be limiting, and patching still leaves you exposed.      Join host Ed Adams, a Ponemon Institute research fellow, for a panel discussion with security professionals, including: JOHN MASSERINI Global CISO, Millicom (Tigo) Telecommunications An industry-recognized leader, John has decades of experience providing Information Security services to multinational organizations in diverse verticals. He is a prolific author and speaker and previously served as CISO for MIAX Options Exchange and Dow Jones. CHARISSE CASTAGNOLI General Counsel & Manager, Instapay Flexible LLC Charisse has over 30 years of experience in the IT industry. She combines her technology expertise with security and legal skills to help organizations meet their security and compliance needs. She is an adjunct Professor of Law at John Marshall Law School. FRED PINKETT Product Director, Absorb Software Fred is a technology expert with 20+ years of experience in the SaaS, Cloud, and cybersecurity fields. Throughout his career, he has worked closely with engineering and marketing teams to bring high-quality and secure products to the market. Join us the hear these experts debate the following topics: - Conducting software composition analysis (SCA) - Assessing threats and impacts - Risk-rating your inventory - Selecting the right controls

Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (257)
Subscribers (12979)
In today's connected world, software runs everything - from smart phones to banking applications, cars to home security systems, even refrigerators, garage doors and other every day devices are "connected." Software is everywhere – and unfortunately, it provides the largest attack surface for hackers. We are a cybersecurity company leveraging our deep knowledge of software security to create relevant products and services.