Executive Boardroom | Digital Supply Chain Threats-Vulnerability Mitigation in 3rd Party Applications
Back

Share:

Digital Supply Chain Threats-Vulnerability Mitigation in 3rd Party Applications

Executive Boardroom - 11:00 am - 11:20 am

"Software is eating the world" is a common refrain describing the oversized influence software has in how we run our businesses. Third party software usage is on the rise, accelerated by WFH initiatives and digital transformation to application development demands. This has resulted in the challenge for many organizations to uncover and manage the inherent risk that this code introduces. 

Vince Arneja, Chief Product Officer at GrammaTech, share his insights into how to uncover and understand the risk of third party software within the software supply chain. 

 You'll Learn: 

  •  How to analyze the risk or vulnerabilities that may be introduced if an institution were to deploy COTS products like video conferencing throughout all of the employees' devices in an organization 
  • Why you should extend the FOSS process to scan for non-source code libraries or binaries being brought into applications by your developers 
  • Ways to identify vulnerabilities in third party software or purchased libraries while creating a software bill of materials

Sponsored by:

GrammaTech View details