#1678343: Webinar - Securing the Software Supply Chain: Managing Third Party Risks - Wed May 14 - 1 PM EST
Description: |
Wednesday, May 14, 2025 at 1 PM EST As organizations increasingly rely on third-party software and services, and adversaries target them as a way into large enterprises, securing the software supply chain has become critical. But there are challenges. How can you gain visibility across the software supply chain? How do you evaluate your software development lifecycle (SDLC) systems? What is the right use for automation in shoring up the software supply chain? Learn about best practices for managing risks associated with third-party vendors and the tools available to help. Speakers: Jake Williams, VP of R&D, Hunter Strategy Jake Williams is a cybersecurity expert has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. He has worked with many government agencies in information security at federal, state, and local levels. Williams is an IANS Faculty Member and also works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government. Jonathan Magee, Sr. Domain Consultant, Palo Alto Networks Jonathan Magee is a Senior Domain Consultant at Palo Alto Networks, bringing over 25 years of experience in the IT industry. Specializing in Cloud Security, Jonathan has collaborated with large global enterprises to architect and implement Palo Alto Networks' Prisma Cloud security platform. With deep expertise in Cloud Native Applications Security, DevSecOps, and Vulnerability Management, Jonathan has helped organizations enhance their security posture in an ever-evolving digital landscape. Currently, he focuses on Cloud Native Application, Data, and AI security, with a particular emphasis on Vulnerability Management and Remediation. |
---|---|
More info: | https://dr-resources.darkreading.com/free/w_palo289/ |
Date added | April 26, 2025, 6:37 p.m. |
---|---|
Source | DarkReading |
Subjects |
|
Venue | May 14, 2025, midnight - May 14, 2025, midnight |