Join the discussion as we address the emerging new responsibilities for the CISO role, and how to go beyond effectively communicating new security strategies and recommendations.
RegisterJoin us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.
Register