Securing the Software Supply Chain

Logo
Presented by

Paul Hampton, Senior Product Manager, Thales; Kieran Miller, Chief Architect, Garantir

About this talk

Supply chain attacks can have catastrophic impacts and are some of the most difficult to prevent. These attacks can cause serious financial, and even national security, consequences and are typically carried out by well-resourced attackers, such as nation-states. In this webinar, we will discuss the anatomy of a supply chain attack and what you can do to prevent your enterprise from falling victim. While some of the ground we will cover is aimed at technology companies, it is relevant to any company that consumes software from a third-party vendor or produces software for internal or external purposes.
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (609)
Subscribers (78523)
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.