About

Protecting the software supply chain is increasingly important in the wake of rising cyber threats. This comprehensive guide explores recent regulations and best practices designed to enhance security.

Topics Include: 

The Biden Administration's executive orders key guidelines from NIST and CISA, the EU's Cyber Resilience Act, and more.

Learn about current methods like Software Bills of Materials (SBOMs), Software Composition Analysis (SCA), and the new behavioral runtime fingerprint standard.

Equip your organization with the knowledge to safeguard your software development and deployment processes effectively.

Share  this Post

DOWNLOAD

Whitepaper Download Closed

This document is no longer available for download. Check our resources page for other helpful information

Synopsis

Protecting the software supply chain is increasingly important in the wake of rising cyber threats. This comprehensive guide explores recent regulations and best practices designed to enhance security.

Topics Include: 

The Biden Administration's executive orders key guidelines from NIST and CISA, the EU's Cyber Resilience Act, and more.

Learn about current methods like Software Bills of Materials (SBOMs), Software Composition Analysis (SCA), and the new behavioral runtime fingerprint standard.

Equip your organization with the knowledge to safeguard your software development and deployment processes effectively.

Share  this Post

REGISTER

This webinar has closed.

This asset is no longer available for download.

Release Date:
July 30, 2024
SYNOPSIS

Protecting the software supply chain is increasingly important in the wake of rising cyber threats. This comprehensive guide explores recent regulations and best practices designed to enhance security.

Topics Include: 

The Biden Administration's executive orders key guidelines from NIST and CISA, the EU's Cyber Resilience Act, and more.

Learn about current methods like Software Bills of Materials (SBOMs), Software Composition Analysis (SCA), and the new behavioral runtime fingerprint standard.

Equip your organization with the knowledge to safeguard your software development and deployment processes effectively.

Share  this Post

The Speakers

No items found.
SYNOPSIS

Protecting the software supply chain is increasingly important in the wake of rising cyber threats. This comprehensive guide explores recent regulations and best practices designed to enhance security.

Topics Include: 

The Biden Administration's executive orders key guidelines from NIST and CISA, the EU's Cyber Resilience Act, and more.

Learn about current methods like Software Bills of Materials (SBOMs), Software Composition Analysis (SCA), and the new behavioral runtime fingerprint standard.

Equip your organization with the knowledge to safeguard your software development and deployment processes effectively.

Share  this Post

Put RAD’s AI To Work