Proven Strategies to Safeguard Software Supply Chains from Catastrophe

Presented by

Joe Nicastro, Field CTO, Legit Security & Melinda Marks, Practice Director, Application & Cloud Security, ESG

About this talk

In today's rapidly evolving tech landscape, development environments have become increasingly intricate, presenting new challenges for application and software security. As attackers shift their focus from traditional application targets to exploiting vulnerabilities within software supply chains, the stakes have never been higher.   Join us for an insightful Fireside Chat on this topic at the 2024 Black Hat Summit, as Enterprise Strategy Group's Melinda Marks, Practice Director of Application & Cloud Security and Legit Security Field CTO, Joe Nicastro, dive into the complexities of modern development pipelines, explore the emerging threats, and discuss strategies to safeguard your software supply chains from potential catastrophes.   Watch the session live or register for the on-demand recording to access Nicastro’s and Enterprise Strategy Group’s insight and best practices for improving: • Software supply chain, visibility, and security • Application security posture management (ASPM) • And more
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (7)
Subscribers (277)
Legit is a new way to manage your application security posture for security, product and compliance teams. With Legit, enterprises get a cleaner, easier way to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing security teams, including GenAI usage, proliferation of secrets and an uncontrolled dev environment. Fast to implement and easy to use, Legit lets security teams protect their software factory from end to end, gives developers guardrails that let them do their best work safely, and proves the success of the security program. This new approach means teams can control risk across the business – and prove it.