; Venafi Webinar: Software Supply Chain: Code-to-Code Combat - View
                                                                 
 
VENAFI
Software Supply Chain: Code-to-Code Combat

Featured Speaker: 
Eddie Glenn, Senior Product Marketing Manager, Venafi
 
Thursday, April 2, 2020
2:00pm ET; 11:00am PT
60 minutes
Online
REGISTER NOW »

*Attend and earn 1 CPE credit
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party.

However, hackers know this and they are stealing code-signing private keys to make their malware look legitimate. Signing code is no longer enough to protect against this threat. Agencies need to protect the code signing credentials that they utilize and ensure that they are only ever used for authorized circumstances.

In this webcast we’ll discuss:

  • How to ensure that cybercriminals do not steal your code signing credentials
  • How code signing is an effective tool to protect against PowerShell modification
  • Homeland Security's CISA Alert AA220-006A and what precautions you should take to protect PowerShell scripts from 3rd party modification

carahsoft
Samantha Barnes
703-581-6610

Are you an ISCmember? If so, you can earn one CPE credit for attending! Be sure to enter your ISCmember ID on the registration page. 
By supplying my contact information, I authorize Carahsoft and its vendors and partner community to contact me with personalized communications about their products and services. Please review our Privacy Policy for more details or to opt-out at any time.
 
 
 
© 2020 Carahsoft Technology Corp.
11493 Sunset Hills Road
Reston, Virginia  20190
www.carahsoft.com
T: 703.871.8500  |  F: 703.871.8505