DoDIIS Worldwide Webinar Series: Three Fundamental Safeguards that Stop Unauthorized Code in Software Supply Chain
This on-demand webinar armed attendees with knowledge and strategies to halt unauthorized code from compromising your software supply chain. Faisal Razzak of Venafi guided attendees through three foundational safeguards that are indispensable for a secure software supply chain:
- Robust Code Signing Processes: We'll discuss how to establish a verifiable identity for software components, preventing unauthorized code from penetrating your supply chain.
- Rigorous Protection of Signing Keys: Learn to defend the digital keys that underpin the trust in your software, ensuring they remain out of reach from cyber adversaries.
- Strategic Utilization of Software Bills of Materials (SBOMs): Discover how SBOMs contribute to transparency and accountability, supporting a thorough risk analysis and proactive vulnerability management.
In addition to these pillars, we underscored the necessity of application control measures, such as allowlisting, to ensure that only vetted and approved code is executed across your networks. This practice is crucial in maintaining a tight security posture against unauthorized code, aligning with leading security standards and frameworks, such as NIST, CIS, PCI DSS, CMMC, OWASP, ISO/IEC 27001, Essential Eight, and the Zero Trust Security Framework.
Attendees joined Faisal Razzak in navigating the complexities of stopping unauthorized code, standardizing best practices, and reinforcing software supply chain against the ever-evolving landscape of cyber threats.
Speaker and Presenter Information
Faisal Razzak, Group Product Manager, Venafi
Relevant Government Agencies
DOD & Military, Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
Venafi Government Team at Carahsoft