Jan 12, 2021 @ 1:00 PM
Today, the core of cybersecurity lies in a trusted and verified supply chain. I’ll briefly introduce the challenge of modern supply chain security, including the foundry problem. I'll categorize software and hardware supply chain compromises based on component, level and adversary motivation. I'll review recent initiatives and strategies that aim to address malicious supply chain compromise.
Register now for this on-demand webcast:
If you have questions about registration, contact firstname.lastname@example.org.