Software Supply Chain: Code-to-Code Combat


This event qualifies for 1 CPEs


Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party.

 

However, hackers know this and they are stealing code-signing private keys to make their malware look legitimate. Signing code is no longer enough to protect against this threat. Agencies need to protect the code signing credentials that they utilize and ensure that they are only ever used for authorized circumstances.

 

In this webcast we’ll discuss:

  • How to ensure that cybercriminals do not steal your code signing credentials
  • How code signing is an effective tool to protect against PowerShell modification
  • Homeland Security's CISA Alert AA220-006A and what precautions you should take to protect PowerShell scripts from 3rd party modification

Speaker and Presenter Information

Eddie Glenn, Senior Product Marketing Manager, Venafi

Relevant Government Agencies

Intelligence Agencies, DOD & Military, Dept of Homeland Security, CIA, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, Apr 2, 2020, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Venafi Government Team at Carahsoft


Contact Event Organizer


Join the event conversation:
@venafi carahsoft


Return to search results