Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Venafi_CYBR_logo_microsite.png
Venafi

DoDIIS Worldwide Webinar Series: Three Fundamental Safeguards that Stop Unauthorized Code in Software Supply Chain


Event Date: January 10, 2024
Hosted By: Venafi & Carahsoft
The increasing sophistication of cyber threats, especially those targeting critical infrastructure, has catalyzed a national directive for enhanced cybersecurity measures, as signified by Executive Order 14028. Nation-state actors and other advanced threats are exploiting software supply chains with such efficacy that the integrity of our critical systems is at constant risk. The diverse and complex nature of the software utilized by agencies amplifies this threat, with the potential for a single unauthorized code insertion to trigger catastrophic failures.

This webinar armed attendees with knowledge and strategies to halt unauthorized code from compromising your software supply chain. Faisal Razzak of Venafi guided attendees through three foundational safeguards that are indispensable for a secure software supply chain:

  • Robust Code Signing Processes: We'll discuss how to establish a verifiable identity for software components, preventing unauthorized code from penetrating your supply chain.
  • Rigorous Protection of Signing Keys: Learn to defend the digital keys that underpin the trust in your software, ensuring they remain out of reach from cyber adversaries.
  • Strategic Utilization of Software Bills of Materials (SBOMs): Discover how SBOMs contribute to transparency and accountability, supporting a thorough risk analysis and proactive vulnerability management.

In addition to these pillars, we underscored the necessity of application control measures, such as allowlisting, to ensure that only vetted and approved code is executed across your networks. This practice is crucial in maintaining a tight security posture against unauthorized code, aligning with leading security standards and frameworks, such as NIST, CIS, PCI DSS, CMMC, OWASP, ISO/IEC 27001, Essential Eight, and the Zero Trust Security Framework. 

Attendees joined Faisal Razzak in navigating the complexities of stopping unauthorized code, standardizing best practices, and reinforcing software supply chain against the ever-evolving landscape of cyber threats.


Fill out the form below to view this archived event.


Resources


No resources were found. Please try another search.