Supply Chain Workshop 2024 - Agenda
Register    ➤

Agenda

Times are subject to change.

8:30 AM EDT Thursday, June 27

Editorial

Welcome & Opening Remarks

5 minutes
ON DEMAND

Welcome to the Supply Chain Workshop!

Welcome to the Supply Chain Workshop!

David DiMolfetta
David DiMolfetta
Cybersecurity Reporter
Nextgov/FCW
Read More
8:35 AM EDT Thursday, June 27

Editorial

Securing the Supply Chain: Identifying and Addressing Vulnerabilities

25 minutes
ON DEMAND

In the era of heightened geopolitical tensions and evolving cyber threats, securign the supply chain is paramount to national security. In this session, Mona Harrington will explore the critical steps organizations must take to identify and mitigate vulnerabilities within their supply chains.

In the era of heightened geopolitical tensions and evolving cyber threats, securign the supply chain is paramount to national security. In this session, Mona Harrington will explore the critical steps organizations must take to identify and mitigate vulnerabilities within their supply chains.

Mona Harrington
Mona Harrington
Assistant Director, National Risk Management Center (NRMC)
Cybersecurity & Infrastructure Security Agency
Read More
9:00 AM EDT Thursday, June 27

Editorial

Enhancing Supply Chain Visibility and Vendor Vetting

25 minutes
ON DEMAND

The complexity of modern supply chains necessitates robust visibility and meticulous vendor vetting to mitigate cybersecurity risks. Rosa Underwood, from GSA, will dive into effective strategies for expanding supply chain visibility and vetting vendors comprehensively.

The complexity of modern supply chains necessitates robust visibility and meticulous vendor vetting to mitigate cybersecurity risks. Rosa Underwood, from GSA, will dive into effective strategies for expanding supply chain visibility and vetting vendors comprehensively.

Rosa Underwood
Rosa Underwood
IT Specialist, IT Security Subcategory, Information Technology Category (ITC), Federal Acquisition Service (FAS)
General Services Administration
Read More
9:25 AM EDT Thursday, June 27

Underwritten

Validating Supply Chain Threats and Risks: A Strategic Approach

20 minutes
ON DEMAND

In today’s interconnected world, the complexity of technology supply chains presents significant cybersecurity challenges. Supply chain threats arise from the complex web of manufacturers, suppliers, and sub-suppliers involved in producing hardware and software. These threats can be intentional, such as the insertion of malicious code, or unintentional, like vulnerabilities due to software defects. We will address challenges associated with traditional security tools that often fall short in the supply chain context. For example, Antivirus and EDR tools focus on known malicious binaries and are not designed to audit the intricate layers of hardware and firmware. To overcome these challenges we will explore:

Read More

In today’s interconnected world, the complexity of technology supply chains presents significant cybersecurity challenges. Supply chain threats arise from the complex web of manufacturers, suppliers, and sub-suppliers involved in producing hardware and software. These threats can be intentional, such as the insertion of malicious code, or unintentional, like vulnerabilities due to software defects. We will address challenges associated with traditional security tools that often fall short in the supply chain context. For example, Antivirus and EDR tools focus on known malicious binaries and are not designed to audit the intricate layers of hardware and firmware. To overcome these challenges we will explore:

- How to leverage existing and specific supply chain validation tools

- How to foster organization-wide collaboration that allows us to protect digital supply chains from emerging threats

- Specific strategies to identify, assess and mitigate supply chain risks

Paul Asadoorian
Paul Asadoorian
Principal Security Evangelist
Eclypsium
Read More
9:45 AM EDT Thursday, June 27

Editorial

Coffee Break

10 minutes

Refill your coffee and get ready for part two of this action-packed event!

Refill your coffee and get ready for part two of this action-packed event!

Read More
9:55 AM EDT Thursday, June 27

Editorial

Zero Trust Practices for Supply Chain Security

25 minutes
ON DEMAND

Join Tom Ray of the Army Material Command to explore how prioritizing risk management and implementing zero trust practices can address vulnerabilities and improve supply chain security.

Join Tom Ray of the Army Material Command to explore how prioritizing risk management and implementing zero trust practices can address vulnerabilities and improve supply chain security.

Tom Ray
Tom Ray
Civilian Deputy, Supply Chain Management Directorate, Army Materiel Command
U.S. Army
Read More
10:20 AM EDT Thursday, June 27

Editorial

Strategies for National Cyber Defense of the Supply Chain

25 minutes
ON DEMAND

This discussion with the Chief of the Enduring Security Framework at NSA, Jorge Laurel, will explore how government and industry must collaborate to secure every link of the supply chain, emphasizing risk management from developers to senior leadership, eliminating single points of failure.

This discussion with the Chief of the Enduring Security Framework at NSA, Jorge Laurel, will explore how government and industry must collaborate to secure every link of the supply chain, emphasizing risk management from developers to senior leadership, eliminating single points of failure.

Jorge Laurel
Jorge Laurel
Chief, Enduring Security Framework
National Security Agency
Read More
10:45 AM EDT Thursday, June 27

Editorial

Closing Remarks

5 minutes
ON DEMAND

Thank you for joining the Supply Chain Workshop!

Thank you for joining the Supply Chain Workshop!

David DiMolfetta
David DiMolfetta
Cybersecurity Reporter
Nextgov/FCW
Read More