InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Securing Open-Source Dependencies at Enterprise Scale

Presented by

Yesenia Yser, Founder | Yes2Tech - Software Security Engineering Consulting

About this talk

Open-source software drives enterprise innovation, but unmanaged vulnerabilities create operational risks and regulatory exposure. As cyber threats evolve and compliance frameworks tighten, executives face mounting pressure to balance innovation speed with robust security governance. Traditional approaches to OSS security often create friction between development teams and security requirements, leading to shadow IT practices and increased exposure. This session presents proven frameworks for integrating security into OSS workflows while maintaining developer productivity and meeting emerging regulatory demands like the EU Cyber Resilience Act. Join Yesenia Yser, Security Engineer and Open-Source Advocate, to explore enterprise-grade strategies for OSS risk management. Key Takeaways: Implement governance frameworks that protect OSS dependencies without slowing development Create shared accountability between security, procurement, and engineering teams Apply SLSA, SBOM, and OpenSSF standards to build enterprise-wide security trust Balance regulatory requirements with collaborative open source community practices Turn OSS security management into a strategic business differentiator
Information Security

Information Security

259526 subscribers733 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics