CISO's Guide to
Software Supply Chains

One software update, one misconfiguration, or one vulnerability in an open-source component can cause major disruptions to your business. Securing components, activities, and practices involved in the software supply chain can be a maddening exercise of whack-a-mole.

How do you get a better handle on all the code you’re running so you can support developers, manage risks, and respond to change smoothly and safely? Getting it wrong can be costly for the business and for the executive.

In this webinar, you’ll learn about:

  • Capabilities of a software bill of materials
  • How to assess the many open-source components in your code
  • Tools to identify vulnerabilities and integrate development workflows
  • Where to utilize automation
  • By downloading the report you acknowledge the JFrog Privacy Policy

    Our Partners:

    We’ll cover the three top tips every CISO will get from this webinar

    SBOM Misconceptions

    Having an SBOM is good, but it is NOT your software supply chain. It’s a process with 8 steps

    OSS Management

    The steps to properly assess open-source components in your code AND binaries that improves your security posture while releasing fast

    Automation

    There are two places to use automation well. And three places to look for hidden vulnerabilities