With the proliferation of COTS, Open Source Software, libraries, frameworks, APIs, and other components, modern software is increasingly assembled instead of coded from scratch. While this shift helps deliver feature-rich solutions and interoperability, it also introduces risk and data security challenges.
To manage 3rd-party risks, new assessment and mitigation techniques are needed. Fixing the code is often impossible, pen testing can be limiting, and patching still leaves you exposed.
Join host Ed Adams, a Ponemon Institute research fellow, for a panel discussion with security professionals, including:
JOHN MASSERINI
Global CISO, Millicom (Tigo) Telecommunications
An industry-recognized leader, John has decades of experience providing Information Security services to multinational organizations in diverse verticals. He is a prolific author and speaker and previously served as CISO for MIAX Options Exchange and Dow Jones.
CHARISSE CASTAGNOLI
General Counsel & Manager, Instapay Flexible LLC
Charisse has over 30 years of experience in the IT industry. She combines her technology expertise with security and legal skills to help organizations meet their security and compliance needs. She is an adjunct Professor of Law at John Marshall Law School.
FRED PINKETT
Product Director, Absorb Software
Fred is a technology expert with 20+ years of experience in the SaaS, Cloud, and cybersecurity fields. Throughout his career, he has worked closely with engineering and marketing teams to bring high-quality and secure products to the market.
Join us the hear these experts debate the following topics:
- Conducting software composition analysis (SCA)
- Assessing threats and impacts
- Risk-rating your inventory
- Selecting the right controls