InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Dealing with the “New Normal” of Supply Chain Security Risk

Presented by

Barak Schoster, Sr Director, Chief Architect at Bridgecrew, Palo Alto Networks | Demi Ben-Ari, Co-Founder and CTO at Panorays

About this talk

The “new normal” elicits many different thoughts and emotions about the world that was and the world that is. Along with other upheavals that we’ve experienced over the past year or so are the disastrous effects of numerous far-reaching supply chain breaches and third-party code vulnerabilities. SolarWinds, Kaseya, Codecov and Log4j have become household names in the business world, even among non-tech professionals. Unfortunately, we can only expect that list to get longer as we anticipate more similar attacks. How can we learn from these past cyber events and prepare—with the right people, processes, and tools—for what’s yet to come? Find out: • What actually happened with SolarWinds, CodeCov and Log4Shell. • What you can do to prepare for the next third-party cyber incident. • The different components of supply chain security in the CI/CD pipeline and how developers can be a part of your security program • How to take action when a supply chain attack happens, and how to minimize the blast radius. Get actionable guidance and tips on how to best reduce supply chain risk and contain a breach when it (inevitably) occurs.
Panorays

Panorays

2136 subscribers23 talks
Automate, Accelerate and Scale Your Third-Party Security Management
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.
Related topics