Posted on
in Presentations
SBOMs serve a variety of purposes, and come at different levels of quality and support different tasks. SBOMs can be created for the source files, during build, or built components. Utilizing SBOMs at scale will require a robust ecosystem of tooling for creation and consumption. We’ll review what is available, emphasize open source options and identify gaps and room for innovation.
DevSecOps & Application Security Technology Infrastructure & Operations
DevSecOps supply chain operational technology (OT Security) asset discovery & management risk & vulnerability assessment
Topic
DevSecOps & Application Security
Technology Infrastructure & Operations
Subtopic
DevSecOps
supply chain
operational technology (OT Security)
asset discovery & management
risk & vulnerability assessment
Share With Your Community