Posted on
in Presentations
Modern computing is built upon a foundation of trust that spans across hardware, firmware and operating systems. This trust is established and maintained in a step-by-step, chain-like manner, ensuring that end users can rely on the integrity and security of the entire system. This talk will explore several significant supply chain security incidents related to key management vulnerabilities.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community