SupplyChainCybersecuritySummit 2019 Aug. 12, 2019 to Aug. 13, 2019, Arlington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: When Your OT Support Supports the APT Jake Williams Manufacturing, medical, and many other environments have extremely specialized (and expensive) operational technology (OT) devices. ...
Own Your Software Supply Chain - or It Will Own You John P. Martin Deliver Now! (we’ll fix it later). Most of our suppliers are much more interested in ...
The State of Your Container's Supply Chain Andrew Martin Container security often focuses on runtime best-practices, while neglecting delivery of the software in the ...
Hack Your Lunch: A Live Demo of How Your Supply Chain is Getting Pwned! Brandon Helms Working as a Red Teamer has challenged my thinking and helped build solutions to previously ...
Neutralizing Risk from Customer Engagements Keely Richmond A vulnerability assessment of a customer network found normal issues + China & Russia active ...
U.S Air Force implementation of Cyber-Supply Chain Risk Management (C-SCRM) Alyssa Feola This presentation will show how the Air Force is addressing C-SCRM activities as they relate ...
Software Bill of Materials: Finding Consensus on Third-Party Code Transparency Allan Friedman A "software bill of materials" that lists third-party dependencies can help both software suppliers and ...
Selecting for Security: Searching for Risks from the Supply Chain in IoT Devices at Scale Ryan Speers In this presentation, attendees will learn about supply chain risks specific to Internet of Things ...
Third Party Software Assessments for Modern Development Chris Wysopal Software is no longer delivered on a CD-ROM with occasional updates. Software delivery has become ...
Bring your own threat - supply chain attacks using personal IoT devices in companies Martin Hron According to statistics, 35% of IT Directors report more than 1,000 pieces of shadow IoT ...
When Security Best Practices Meet Your Supply Chain Curt Dukes IT is developed globally. Chip design and fabrication is done in China, Japan, Korea, UAE, ...
Supply Chain Integrity through Hardware Material Analysis Mackenzie Morris Supply chain integrity is an exceptionally difficult problem to address when globalization has pushed manufacturing ...
Trust but Verify: An Argument for Security Testing Vendors Rachel Tobener Before a company shares data with an external vendor, an important question needs to be ...
Hacking the Motherboard: Exploiting implicit trust in all of the forgotten places Sophia D'antoine Last year, Bloomberg's Big Hack article gave everyone a (questionably accurate but) much needed scare ...