News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
Debate: Can SBOM Deliver Practical Value or is it a Pipe Dream?
Debate: Can SBOM Deliver Practical Value or is it a Pipe Dream?
Webinar
22 Mar 2023
Speakers
Tracy Miranda
Head of Open Source
,
Chainguard
Follow @@tracymiranda
Connect on LinkedIn
Michelle Finneran Dennedy
CEO
,
PrivacyCode
Follow @@mdennedy
Connect on LinkedIn
Kevin Poireault
Reporter
,
Infosecurity Magazine
Follow @Kpoireault
Connect on LinkedIn
Why not watch?
Untangling the Web: Navigating Third-Party Risk in a Hyperconnected World
19 Mar 2024
How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0
16 May 2024
Forward-Thinking Practices to Manage IT Risk
12 Oct 2023
Supply Chain Security: Easing the Headache of Third-Party Risk Assessments
6 May 2021
You may also like
#HowTo: Create and Maintain SBOMs
Opinion
12 Jun 2023
#CRESTCon: Jon Geater Discusses Latest Supply Chain Security Best Practices
Interview
22 May 2023
2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization
Opinion
1 Mar 2022
Ask the Experts: Mitigating Supply Chain Security Risks
Magazine Feature
28 Sep 2020
Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners
Opinion
15 May 2020
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
70% of CISOs Expect Cyber-Attacks in Next Year, Report Finds
News
21 May 2024
1
Russia’s DoppelGänger Campaign Manipulates Social Media
News
21 May 2024
2
Ransomware and AI-Powered Hacks Drive Cyber Investment
News
21 May 2024
3
Critical Fluent Bit Bug Impacts All Major Cloud Platforms
News
21 May 2024
4
Over 60% of Network Security Appliance Flaws Exploited as Zero Days
News
21 May 2024
5
Authorized Push Payment Fraud Cases Surge 12% Annually
News
22 May 2024
6
RSAC: Decoding US Government Plans to Shift the Software Security Burden
News
7 May 2024
1
NIST Confusion Continues as Cyber Pros Complain CVE Uploads Stalled
News
14 May 2024
2
New Android Banking Trojan Mimics Google Play Update App
News
17 May 2024
3
Report Suggests 93% of Breaches Lead to Downtime and Data Loss
News
16 Apr 2024
4
Santander Customer Data Compromised Following Third-Party Breach
News
15 May 2024
5
UK Councils Warn of Data Breach After Attack on Medical Supplier
News
17 May 2024
6
How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0
Webinar
16 May 2024
1
Learn from the NHS - Proactive Password Security for Improved Cybersecurity
Webinar
16 May 2024
2
Why DDoS Simulation Testing is Critical for Proactive Network Defense
Webinar
2 May 2024
3
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
4
Is MFA Enough? Strategies for Next-Level Identity Security in 2024
Webinar
11 Apr 2024
5
Understand and Combat the Top Healthcare Cloud Threats Today
Webinar
21 Mar 2024
6
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
15:00
–
17:30 BST, 5 Jun 2024
1
RSAC: CISA Launches Vulnrichment Program to Address NVD Challenges
News
8 May 2024
2
LockBit Leader aka LockBitSupp Identity Revealed
News
7 May 2024
3
How to Proactively Remediate Rising Web Application Threats
Webinar
30 May 2024, 13:00 BST
4
Learn from the NHS - Proactive Password Security for Improved Cybersecurity
Webinar
16 May 2024
5
Live Roundtable Event: Secure Enterprise Browsing, New Ways to Strengthen Endpoint Security
Magazine Event
10:00
–
11:30 BST, 4 Jun 2024
6