
Webinar | Thursday, August 14 @ 1-2pm ET
A Tactical Guide to Managing Third-Party Software Risk
TPSRM in Practice
91% of enterprises experienced a software supply chain incident last year and the vast majority originated from third-party commercial software. With threat actors targeting the binaries your organization buys, trusts, and deploys, traditional vendor questionnaires and vulnerability scans are no longer enough.
This webinar walks through a tactical, 4-step framework Identify, Analyze, Act, and Monitor; that any organization can adopt to manage third-party software risk at scale.
We’ll explore how binary analysis surfaces hidden threats before deployment, how to auto-approve or block software based on policy, and how to keep vendors accountable without source code.
Key Takeaways:
Whether you're starting from scratch or maturing an existing process, this session will help your GRC, AppSec, and procurement teams enforce software risk tolerance with confidence and speed.
Register Now *Attendees will receive an attendance certificate to be used toward CPE credits.