GovForward Supply Chain Workshop banner GovForward Supply Chain Workshop banner

Managing IT Supply Chain Security

The global information technology supply chain has been hit with a growing and unprecedented number of attacks as adversaries attempt to compromise systems with various forms of malware in an attempt to steal or compromise or hold for ransom sensitive information. The supply chain has many layers and components and simple fixes are rare. Vulnerabilities can be exploited in software and hardware and with software defined networks, it can be difficult to draw the line between where software ends and hardware begins.

In this workshop, industry leaders discussed the current threat landscape, the solutions being deployed to counter these threats, and what management plans and processes are available.

Click on each speaker to learn more about how their company helps address the supply chain imperative:

Dan Carayiannis headshot
Dan Carayiannis
Public Sector Director, RSA Archer
Ann Johnson headshot
Ann S. Johnson
Corporate Vice President of Security, Compliance & Identity (SCI) Business Development, Microsoft
Brad Berkey headshot
Brad Berkey
Global Business Strategy, Microsoft
John Loucaides headshot
John Loucaides
VP, R&D, Eclypsium
Erik Ekwurzel headshot
Erik Ekwurzel
Chief Technology Officer, Dun & Bradstreet

Session 1: Understanding and Managing Third-Party Risk with Visibility, Insight, & Action

Learn more about this session and RSA's ability to secure supply chains by downloading the
1-page overview.

Interested in scheduling a meeting? Contact a dedicated RSA representative at Carahsoft.

Session 2: How Microsoft is Addressing IT Supply Chain Security

Learn more about this session and Microsoft's ability to secure supply chains by downloading the
1-page overview.

Interested in scheduling a meeting? Contact a dedicated Microsoft representative at Carahsoft.

Session 3: Assuring Device Integrity in the Supply Chain and Beyond

Learn more about this session and Eclypsium's ability to secure supply chains by downloading the
1-page overview.

Interested in scheduling a meeting? Contact a dedicated Eclypsium representative at Carahsoft.

Session 4: Applying Machine Learning to Reveal Hidden Supply Chain Resilience Weaknesses and Adversarial Infiltration

Learn more about this session and Dun & Bradstreet's ability to secure supply chains by downloading the 1-page overview.

Interested in scheduling a meeting? Contact a dedicated Dun & Bradstreet representative at Carahsoft.