Agenda
June 27, 2024
Times are subject to change.
Editorial
Welcome & Opening Remarks
Welcome to the Supply Chain Workshop!
Welcome to the Supply Chain Workshop!
David DiMolfetta
Cybersecurity ReporterNextgov/FCW
Editorial
Securing the Supply Chain: Identifying and Addressing Vulnerabilities
In the era of heightened geopolitical tensions and evolving cyber threats, securign the supply chain is paramount to national security. In this session, Mona Harrington will explore the critical steps organizations must take to identify and mitigate vulnerabilities within their supply chains.
In the era of heightened geopolitical tensions and evolving cyber threats, securign the supply chain is paramount to national security. In this session, Mona Harrington will explore the critical steps organizations must take to identify and mitigate vulnerabilities within their supply chains.
Mona Harrington
Assistant Director, National Risk Management Center (NRMC)Cybersecurity & Infrastructure Security Agency
Editorial
Enhancing Supply Chain Visibility and Vendor Vetting
The complexity of modern supply chains necessitates robust visibility and meticulous vendor vetting to mitigate cybersecurity risks. Rosa Underwood, from GSA, will dive into effective strategies for expanding supply chain visibility and vetting vendors comprehensively.
The complexity of modern supply chains necessitates robust visibility and meticulous vendor vetting to mitigate cybersecurity risks. Rosa Underwood, from GSA, will dive into effective strategies for expanding supply chain visibility and vetting vendors comprehensively.
Rosa Underwood
IT Specialist, IT Security Subcategory, Information Technology Category (ITC), Federal Acquisition Service (FAS)General Services Administration
Underwritten
Validating Supply Chain Threats and Risks: A Strategic Approach
In today’s interconnected world, the complexity of technology supply chains presents significant cybersecurity challenges. Supply chain threats arise from the complex web of manufacturers, suppliers, and sub-suppliers involved in producing hardware and software. These threats can be intentional, such as the insertion of malicious code, or unintentional, like vulnerabilities due to software defects. We will address challenges associated with traditional security tools that often fall short in the supply chain context. For example, Antivirus and EDR tools focus on known malicious binaries and are not designed to audit the intricate layers of hardware and firmware. To overcome these challenges we will explore:
- How to leverage existing and specific supply chain validation tools
- How to foster organization-wide collaboration that allows us to protect digital supply chains from emerging threats
- Specific strategies to identify, assess and mitigate supply chain risks
In today’s interconnected world, the complexity of technology supply chains presents significant cybersecurity challenges. Supply chain threats arise from the complex web of manufacturers, suppliers, and sub-suppliers involved in producing hardware and software. These threats can be intentional, such as the insertion of malicious code, or unintentional, like vulnerabilities due to software defects. We will address challenges associated with traditional security tools that often fall short in the supply chain context. For example, Antivirus and EDR tools focus on known malicious binaries and are not designed to audit the intricate layers of hardware and firmware. To overcome these challenges we will explore:
Read MorePaul Asadoorian
Principal Security EvangelistEclypsium
Editorial
Coffee Break
Refill your coffee and get ready for part two of this action-packed event!
Refill your coffee and get ready for part two of this action-packed event!
Editorial
Zero Trust Practices for Supply Chain Security
Join Tom Ray of the Army Material Command to explore how prioritizing risk management and implementing zero trust practices can address vulnerabilities and improve supply chain security.
Join Tom Ray of the Army Material Command to explore how prioritizing risk management and implementing zero trust practices can address vulnerabilities and improve supply chain security.
Tom Ray
Civilian Deputy, Supply Chain Management Directorate, Army Materiel CommandU.S. Army
Editorial
Strategies for National Cyber Defense of the Supply Chain
This discussion with the Chief of the Enduring Security Framework at NSA, Jorge Laurel, will explore how government and industry must collaborate to secure every link of the supply chain, emphasizing risk management from developers to senior leadership, eliminating single points of failure.
This discussion with the Chief of the Enduring Security Framework at NSA, Jorge Laurel, will explore how government and industry must collaborate to secure every link of the supply chain, emphasizing risk management from developers to senior leadership, eliminating single points of failure.
Jorge Laurel
Chief, Enduring Security FrameworkNational Security Agency
Editorial
Closing Remarks
Thank you for joining the Supply Chain Workshop!
Thank you for joining the Supply Chain Workshop!
David DiMolfetta
Cybersecurity ReporterNextgov/FCW