April 24, 2025
Time: 12:00 pm ET | 9:00 am PT
Speaker: Wes Dobry, VP of Solution Engineering
Modern enterprises don't just risk their own security—they inherit the vulnerabilities of every supplier and technology partner in their ecosystem.
In this webinar you will learn:
- Hardware and Firmware Supply Chain Risk: Discover advanced techniques for validating component authenticity, detecting tampering, and implementing hardware-level security controls that provide visibility into supply chain integrity from chip to cloud, following NIST C-SCRM SP 800-161r1 guidance for provenance verification.
- Monitoring Asset Integrity Over Time: Learn how leading organizations deploy continuous verification systems that track the security posture of critical assets throughout their lifecycle, from procurement through decommissioning, implementing NIST's recommended approaches for supply chain transparency and continuous monitoring.
- Closing the Back Door Against Advanced Threats: Explore practical strategies for identifying and remediating hidden access points in your supply chain, including compromised updates, embedded backdoors, and third-party code dependencies, based on NIST C-SCRM threat mitigation frameworks and emerging best practices.