UnknownCyber

More Events
Past EventsOn-Demand Events

Events We Are Sponsoring

Procuring in the Dark: Unmasking Hidden Risks in AI-Generated and Third-Party Software

May 12, 2026

Virtual / Online

UnknownCyber Government Team at Carahsoft

Unknown Cyber’s Software Scan offers a revolutionary, deterministic approach to verify third-party software upon delivery, directly answering Gartner’s call to perform Binary Composition Analysis (BCA) on high-risk software. Powered by DARPA-developed genomic analysis, it mathematically computes the ultimate effects of every function on registers and memory. This means compliance professionals, risk managers, and leaders can achieve unprecedented, auditable accuracy regarding exactly what is inside their vendors' binaries, without ever needing the proprietary source code. By moving from probabilistic guesswork to deterministic truth, organizations can embed continuous monitoring into procurement, establish a verifiable Zero Trust posture, and confidently meet CMMC 2.0 mandates.

Join Unknown Cyber to discover how to operationalize Gartner's recommendations for supply chain security, replacing blind trust and incomplete SBOMs with deterministic mathematical verification at the time of procurement.

What Attendees Can Expect to Learn:

  • The financial and board-level impact of software supply chain breaches, which have seen a 100% year-over-year growth.
  • Why Gartner explicitly recommends embedding Binary Composition Analysis (BCA) into procurement and renewal contracts to technically validate software and supplier SBOMs.
  • How the rise of AI-generated code is silently injecting vulnerabilities into commercial software (with AI failing to write secure code 45% of the time).
  • The critical flaw in probabilistic scanning methods that rely on surface-level file structures, and why they fail as a "black box" against modern threats.
  • How to achieve deterministic, auditable accuracy by analyzing the mathematical effects of software functions on registers and memory—without needing vendor source code.
Learn more
View all