InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

C-SCRM Downstream Security: Using NIST CSF for Cyber Supply Chain Risk Management

Presented by

Wes Dobry, VP Solutions Engineering, Eclypsium

About this talk

Speaker: Wes Dobry, VP of Solution Engineering Modern enterprises don't just risk their own security—they inherit the vulnerabilities of every supplier and technology partner in their ecosystem. In this webinar you will learn: Hardware and Firmware Supply Chain Risk: Discover advanced techniques for validating component authenticity, detecting tampering, and implementing hardware-level security controls that provide visibility into supply chain integrity from chip to cloud, following NIST C-SCRM SP 800-161r1 guidance for provenance verification. Monitoring Asset Integrity Over Time: Learn how leading organizations deploy continuous verification systems that track the security posture of critical assets throughout their lifecycle, from procurement through decommissioning, implementing NIST's recommended approaches for supply chain transparency and continuous monitoring. Closing the Back Door Against Advanced Threats: Explore practical strategies for identifying and remediating hidden access points in your supply chain, including compromised updates, embedded backdoors, and third-party code dependencies, based on NIST C-SCRM threat mitigation frameworks and emerging best practices.
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3911 subscribers50 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics