Matt Rose, ReversingLabs, Mike Rothman, Techstrong Research, Mike Vizard, Techstrong Group
In the wake of a series of high-profile breaches, it’s become apparent just how vulnerable software
supply chains really are. But where, exactly, are the most critical vulnerabilities? And what does
effective software supply chain security actually look like?
This session explores where security pros fit in the application development puzzle, the trends
impacting this relationship, and best practices for securing the software supply chain. Topics covered
• Different vendors, different definitions: What is software supply chain security?
• Known vs. unknown vulnerabilities and where you should focus your efforts
• RIP shift left: Where do we go from here?
• And more