Securing the Software Supply Chain with Code Signing

Logo
Presented by

Riley Dickens from Encryption Consulting

About this talk

In this webinar, Riley Dickens - a consultant with Encryption Consulting, will explore the benefits of code signing and how it can be used to secure the software supply chain. He will discuss the different types of code-signing certificates available and how they can be used to sign various types of software, including executables, drivers, and scripts. He will also cover best practices for implementing code signing in your organization and how to manage your code signing certificates. Key points his webinar discusses: - The importance of secure software supply chains - How code signing works and the different types of code signing certificates available - Best practices for implementing code signing in your organization - How to manage your code signing certificates and keep them secure - Real-world examples of code signing in action and how it has helped organizations prevent software supply chain attacks By the end of this webinar, you will have a better understanding of how code signing can help protect your organization from software supply chain attacks and how to implement it effectively. Questions Answered: 1. Where and when do you recommend code signing? Similarly, where and when do you recommend verifying the signed artifact? 2. How can organizations ensure that their code signing practices are compliant with industry standards and regulations? 3. You mention a number of risks and threats to code signing, is it still safe to use even though there are so many risks involved?
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (18)
Subscribers (537)
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.