InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Stop worrying and love SBOM – What is it? Why? How does it help you manage risk?

Presented by

Rob Brown, Co-Founder & VP Marketing, Jitsuin, Will Godfrey, Jitsuin and Rob Dobson, Device Authority

About this talk

President Biden's Executive Order to improve cybersecurity directly relates to the trustworthiness and transparency in ALL digital infrastructure (IT, OT, IoT, IIoT). Anything that runs software is in scope – cloud services, on-prem application servers and connected things. Rogue or malfunctioning software is difficult to spot, and often stems from the lack of transparency in development of commercial software. A one-shot security evaluation or pentest is not enough – proof of security and safety must accompany any software throughout its useful lifespan. The Executive Order calls to equip federal users with a new defense that will deliver trust through transparency: the SBOM. This session will outline what an SBOM is and how it helps organisations to manage risk.
Device Authority - IoT Security

Device Authority - IoT Security

6391 subscribers105 talks
Discovery, visibility and automated security
Device Authority enables end to end cyber resilience for connected devices through the discovery, visibility and automated security of large IoT/OT deployments. With device identities outnumbering human identities 82:1 in enterprise environments and as unmanaged devices become a major target for attack, Device Authority’s Discovery Tool and KeyScaler-as-a-Service (KSaaS) platform provide organizations with complete visibility and control of their device identities and vulnerabilities, reducing human error, accelerating incident response, minimizing risk, ensuring complete device and data trust, and enabling trusted AI in any connected environment.​
Related topics