Upcoming Events
Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.
What if the greatest risk in your supply chain isn’t the supplier you know—but the influence you can’t see?
As federal agencies accelerate AI adoption and modernization, foreign ownership, control or influence (FOCI) is an urgent yet often overlooked threat across ...
Chainguard and Dr. Ron Ross hosted a three-part webinar series focused on modernizing risk management and strengthening trust in Federal software delivery.
The sessions examined how trusted software factories, verifiable artifacts and inheritable ...
Unknown Cyber’s Software Scan offers a revolutionary, deterministic approach to verify third-party software upon delivery, directly answering Gartner’s call to perform Binary Composition Analysis (BCA) on high-risk software. Powered by DARPA-developed genomic analysis, it ...
Join us for a webinar featuring Exiger and AWS to learn how agencies can uncover and address risk beyond tier one suppliers.
As supply chain attacks escalate in frequency and severity, meeting the security and compliance expectations set by the Canadian Centre for Cyber Security (CCCS) has become increasingly important, yet grown complex with pressure to deliver more with less.
Join GitLab for an upcoming ...
Archived Events
Join us to explore the digital supply chain of the federal government and how it is evolving from the user to the application. Government workers are working from home, third-party locations, and offices that may not be as strong as their home office.
During this Power Breakfast, Washington Technology convened acquisition leaders, cybersecurity executives, and integrators that unpacked CMMC implementation timelines, ISACA’s certification transition, SBOM and zero-trust expectations, and practical strategies for securing and modernizing supply chains ...
This on-demand session explores how federal agencies are modernizing third-party software onboarding by moving away from manual, fragmented assessments toward automated, policy-driven analysis. Whether you’re looking to reduce ATO timelines or improve ...
You've locked down your agency's perimeter, deployed Zero Trust controls and trained your workforce to avoid phishing emails. But what about the hundreds – or thousands – of suppliers, ...