Overview
Explore how vendors are simplifying security integration in their products through this 90-minute webcast featuring experts from Dell Technologies, Red Hat, Cisco, and Microsoft. Gain actionable insights on improving architectures and automation to address the security professional deficit, benefiting State, Local, Tribal, and Territorial networks as well as SMBs. Learn about building security into systems, automating assessments, and implementing foundational control frameworks without additional resources. Discover topics such as authentication, software supply chain, shift left methodologies, transparency, Sigstore, SCV, source code security, hardware inventory, Software Bill of Materials, and automation techniques for enhanced security assurance.
Syllabus
Introduction
Authentication
Software Supply Chain
Shift Left
Foundational Controls
Transparency
Up the Stack
Sigstor
SCV
Source code
Microsoft initiatives
Inventory of hardware
Software Bill of Materials
Sigsto
Automation and assurance
Taught by
RSA Conference