Virtual Summit Today: Supply Chain & Third-Party Risk Summit
Cyber risk doesn’t stop at your perimeter. Today’s most dangerous threats could be hiding in your software supply chain.

Aggregated from SecurityWeek
This article was automatically aggregated from an external source. Content may be summarized.
Full Analysis

SecurityWeek’s Supply Chain & Third-Party Risk Summit is now open and runs today from 11AM – 4PM ET.
Modern organizations are navigating an increasingly complex ecosystem of vendors, SaaS platforms, APIs, and AI-enabled tools, each introducing new layers of risk.
Login now to the virtual conference center to discover the latest frameworks, tools, and best practices to strengthen your defenses against malware, data exposure, and compromised dependencies.
Today’s summit will help you:
- Understand how software supply chain attacks are evolving
- Gain visibility into third-party and vendor risk at scale
- Learn how AI and automation are reshaping risk management
- Explore real-world attack scenarios and defense strategies
- Discover tools and frameworks to strengthen your security posture immediately
- 11:00AM ET – Hyper TPRM: Rethinking Third-Party Risk for Scale, Speed, and Confidence (Ed Thomas, ProcessUnity)
- 11:30AM – The Power of Orchestration: Navigating Multi-Brand Experiences (Nathan Langton, Ping Identity)
- 12:00PM – Unmasking the Attacker’s Playbook: Dissecting Software Supply Chain Threats (Ziad Ghalleb, Wiz)
- 12:30PM – BREAK – Visit Virtual Expo
- 12:45PM – Software Supply Chain Risk Now Runs Client-Side: What OWASP’s Top 10 Shift Means for CISOs (Gareth Bowker, Jscrambler)
- 1:15PM – Agent Integration as an Identity problem (Mudita Khurana, Airbnb)
- 1:45PM – AI-Driven Vendor Risk Orchestration: Autonomous Framework for Third-Party Monitoring (Nirajkumar Radhasharan Barot, JPMorgan Chase)
- 2:15PM – 4:00PM – Technical Demos, Networking and Virtual Expo

More from SecurityWeek News
- Surf AI Raises $57 Million for Agentic Security Operations Platform
- In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
- Webinar Today: Securing Fragile OT in an Exposed World
- In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike
- Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity
- Fig Security Launches With $38 Million to Bolster SecOps Resilience
- In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators
- In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI
Latest News
- EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations
- Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
- Manifold Raises $8 Million for AI Detection and Response
- Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach
- Apple Debuts Background Security Improvements With Fresh WebKit Patches
- Researcher Discovers 4th WhatsApp View Once Bypass; Meta Won’t Patch
- Tech Giants Invest $12.5 Million in Open Source Security
- UK Companies House Exposed Details of Millions of Firms

Daily Briefing Newsletter
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Join the event where top security experts unpack the biggest software supply chain risks.
Originally published by SecurityWeek
Original Source
SecurityWeek