Upcoming Events
Join Black Duck at the 27th Annual Information Security Forum from May 20-21 in Austin, Texas.
Hosted by Texas Department of Information Resources (DIR) Office of the Chief Information Security Officer (OCISO), in partnership with the Texas Cyber Command, this event brings together IT professionals ...
Join us for a webinar featuring Exiger and AWS to learn how agencies can uncover and address risk beyond tier one suppliers.
Open source software powers nearly every mission system, but recent attacks show the real risk starts long before code reaches production. Threat actors are targeting the software supply chain itself, exploiting ...
As Department of Energy teams adopt Generative AI, they must balance rapid innovation with the security risks of air-gapped enclaves and classified environments. To maintain a defensible posture, Federal leaders must bridge the gap between AI development and the stringent governance required for ...
Archived Events
a {
text-decoration: none;
color: #464feb;
}
tr th, tr td {
border: 1px solid #e6e6e6;
}
tr th {
background-color: #f5f5f5;
}
Unknown Cyber’s Software Scan offered a revolutionary, ...
Chainguard and Dr. Ron Ross hosted a three-part webinar series focused on modernizing risk management and strengthening trust in Federal software delivery.
The sessions examined how trusted software factories, verifiable artifacts and inheritable ...
What if the greatest risk in your supply chain isn’t the supplier you know—but the influence you can’t see?
As federal agencies accelerate AI adoption and modernization, foreign ownership, control or influence (FOCI) is an urgent yet often overlooked threat across ...
Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.
Join us to explore the digital supply chain of the federal government and how it is evolving from the user to the application. Government workers are working from home, third-party locations, and offices that may not be as strong as their home office.
During this Power Breakfast, Washington Technology convened acquisition leaders, cybersecurity executives, and integrators that unpacked CMMC implementation timelines, ISACA’s certification transition, SBOM and zero-trust expectations, and practical strategies for securing and modernizing supply chains ...