It is of utmost importance that organizations possess an understanding of how hardware and software components of the products they use can impact regulatory requirements, security, and compliance for their organization. Information Technology (IT) and Operational Technology (OT) vendors and their end-use critical infrastructure organizations can now understand how their ‘crown jewel’ IT and OT assets are protected.
Learn how critical infrastructure technology can be illuminated by an understanding of product security controls, SBOMs, HBOMs, VEX (Vulnerability Exploitability Exchange information) and related vulnerability information, any data analytics, provenance and origins of components and how it can help asset owners mitigate risk for critical infrastructure assets.
In this webinar, you will gain an understanding of....