התחל במצב לא מקוון עם האפליקציה Player FM !
Leveraging Software Bill of Materials Practices for Risk Reduction
Manage episode 376298089 series 1264075
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of leading practices for building an SBOM and using it to support risk reduction.
The SEI SBOM Framework provides a roadmap for managing vulnerabilities and risks in third-party software, including commercial-off-the-shelf (COTS) software, government-off-the-shelf (GOTS) software, and open-source software (OSS). A set of use cases informed the identification of SBOM practices, including building an SBOM and using it to manage risks to software intensive systems. These foundational practices were augmented using key security management concepts, such as the need to address requirements, planning and preparation, infrastructure, and organizational support. In this webcast, Charles Wallen, Carol Woody, and Michael Bandor discuss how organizations can connect SBOMs to acquisition and development to support improved system and software assurance.
164 פרקים
Manage episode 376298089 series 1264075
A Software Bill of Materials (SBOM) is a comprehensive list of software components involved in the development of a software product. While recently gaining attention in the context of security, SBOMs have limited value unless properly integrated into effective cyber risk management processes and practices. The SEI SBOM Framework compiles a set of leading practices for building an SBOM and using it to support risk reduction.
The SEI SBOM Framework provides a roadmap for managing vulnerabilities and risks in third-party software, including commercial-off-the-shelf (COTS) software, government-off-the-shelf (GOTS) software, and open-source software (OSS). A set of use cases informed the identification of SBOM practices, including building an SBOM and using it to manage risks to software intensive systems. These foundational practices were augmented using key security management concepts, such as the need to address requirements, planning and preparation, infrastructure, and organizational support. In this webcast, Charles Wallen, Carol Woody, and Michael Bandor discuss how organizations can connect SBOMs to acquisition and development to support improved system and software assurance.
164 פרקים
כל הפרקים
×
1 I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds 57:16

1 A New Performance Zone for Software for National Security 1:02:23

1 Identifying and Mitigating Cyber Risk 47:33

1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07

1 Cybersecurity Priorities in 2025 32:21

1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05

1 Secure Systems Don’t Happen by Accident 59:08

1 Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance 38:50

1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22

1 Ask Us Anything: Supply Chain Risk Management 41:11

1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10

1 Cyber Supply Chain Risk Management: No Silver Bullet 38:40

1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03

1 Institutionalizing the Fundamentals of Insider Risk Management 56:33

1 What’s Wrong with ROI for Model-Based Analysis of Cyber-Physical Systems? 56:06

1 Will Rust Solve Software Security? 53:38

1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.