Application Security/Software Assurance
Security Congress Abstract
The digital agenda has transformed traditional iron-slinging, resource-extracting, infrastructure-forging, human-transporting organizations to compete in today’s marketplace. What were considered dumb, physical products are now connected, intelligent, adaptable and more precise than ever. They leverage connected components from global suppliers, which impact the security of the end products. This requires a closer look at supplier security practices and companies’ own product security initiatives. This discussion will focus on impacts supplier and product manufacturer security programs can make, including:
-product and supplier risk tiers and component decomposition
-supplier product security controls
-manufacturer validation, testing and safeguard implementation
-ongoing product security testing and monitoring
This approach enables the business to improve its selections of suppliers and components, resulting in more secure end products.