Securing Software Supply Chain

... Provenance, composition, and vulnerability remediation

Today supply chain security and risk management is the buzzword everyone is talking about. The supply chain is the backbone of any industry and with the increase in complexity, out-sourcing, and off-shoring, disruptions in the supply chain have increased. Supply chain security is a massively broad area that includes everything from physical threats to cyber threats, from protecting transactions to protecting systems, and from mitigating risk with parties in the immediate business network to mitigating risk derived from third, fourth and "n" party relationships. However, there is growing agreement that supply chain security requires a multifaceted and functionally coordinated approach.

In the past few years, with the tremendous growth in the threat landscape and the use of numerous types of actor vectors to carry out sophisticated attacks like ransomware, supply chain, DDSO etc., it is important to consider security at every step of the software supply chain. An attack like the one that has compromised a single company’s software product and had a ripple effect across more than 1,000 organizations emphasizes how big the problem can get and why it is important to apply security to the whole supply chain, not just to the production environment.

A software supply chain attack occurs when malicious code is purposefully added to a component, using the supply chain of that component to distribute the code to its targets. To fight against such attacks, the Security approach needs to span the whole supply chain, integrating different needs from different pieces. Vulnerability on any of the components can have a significant impact on the end process or the critical operation. Hence, each component in the supply chain needs to be analyzed and addressed as a possible attack vector.

Software supply chain security is the act of securing the components, activities, and practices involved in the creation and deployment of software. It requires the focus on security throughout the entire software development life cycle (SDLC) from designing to implementation. some of the key security considerations include Assessing the security and trustworthiness of the code including third-party or proprietary code, securely build, and deploy code, ensure the security of the protocol interface used, user organizations should Continuously test and monitor deployed applications for threats and many more such practices.

While this short piece has been written to sensitize the reader on supply chain risk management and why securing the software supply chain is important for all from vendors to user organizations. At the upcoming DSCI Best Practice meet 2022, we intend to cover this area in greater detail by calling upon the practitioners and experts who will discuss on "Securing Software Supply Chain... Provenance, composition, and vulnerability remediation" in detail. Best practice meet 2022 also provides a platform for everyone to listen to the panelists and ask questions and contribute to the discussion.


References

Registration Closed

Virtual Event (Day 1) | In-person Event at Four Seasons Hotel, Bengaluru (Day 2)
CLOSED
Virtual Pass
0 4500
  • All Sessions (Virtually) Day 1 - 24th August | 9am - 6pm
  • All stages discussion | Virtually Day 2 - 25th August | 9am - 6pm
CLOSED
On-Site Pass
6000
  • Starting from 25th August at 8:30 am
  • Workshops | Access to all stages & Expo booths Day 2 - 25th August | 9am - 6pm
CLOSED
Individual Pass
4500
  • All Sessions (Virtually) Day 1 - 24th August | 9am - 6pm
  • Workshops | Access to all stages & Expo booths Day 2 - 25th August | 9am - 6pm
CLOSED
SHEroes Pass
3150 4500
  • 30% discount Offer valid only for Women Delegates
  • All Sessions (Virtually) Day 1 - 24th August | 9am - 6pm
  • Workshops | Access to all stages & Expo booths Day 2 - 25th August | 9am - 6pm
CLOSED
Group Discount
3600 4500
  • Get 20% discount on registration of 3+ attendees
  • All Sessions (Virtually) Day 1 - 24th August | 9am - 6pm
  • Workshops | Access to all stages & Expo booths Day 2 - 25th August | 9am - 6pm
CLOSED
Early Bird Pass
3375 4500
  • 25% discount Offer valid till 31st July, 2022
  • All Sessions (Virtually) Day 1 - 24th August | 9am - 6pm
  • Workshops | Access to all stages & Expo booths Day 2 - 25th August | 9am - 6pm

Terms & Conditions:

  • Early Bird Pass: You have to make the payment within 15 days of sending your registration or by 31st July 2022, whichever comes earlier, failing which the offer will not be valid.
  • Individual Pass: You have to make the payment within 15 days of sending your registration or by 22nd August 2022, whichever comes earlier, failing which the offer will not be valid.
  • SHEroes: The pass is valid to the women delegates only. Any registrations other than the specified will be rejected.
  • Cancellations: last date for request for cancellation of your registration is 10th August 2022 with 75% refund. 25% of the fees would be withheld as processing fees at any given point of time. Substitutions are welcome till 22nd August 2022.
  • DSCI Member's discount: As a valuable DSCI member, get individual pass at discount of 50% on Rs. 4,500/-. Write to membership@dsci.in for more details.
Day 2 Event Location:
Four Seasons Hotel
8, Bellary Road, Ganganagar
Bengaluru, Karnataka 560032

Get Directions »