As the cyber threat landscape evolves and external dependencies grow more complex, managing risks to enterprises and connected embedded systems requires more than reactive measures. Many organizations are proactively reducing their attack surfaces both in their cyber supply chain and in assets being targeted for exploitation. This is particularly significant for network-connectable devices. The Internet of Things (IoT) is contributing to a massive proliferation of a variety of types of software-reliant, connected devices throughout critical infrastructure sectors. Testing can provide the information needed to determine “fitness for use” and trustworthiness of assets. IT asset management should leverage automated means for detecting weaknesses and vulnerabilities in software. Addressing cyber supply chain dependencies enables enterprises to harden their attack surface by comprehensively identifying exploit targets, understanding how assets are attacked, and providing more responsive mitigations. Security automation tools and services, testing, and certification programs now provide means for organizations to reduce risk exposures attributable to exploitable software. This presentation addresses means for using information to prioritize mitigation efforts focused on reducing exploitable attack vectors, thus enabling organizations to proactively harden their attack surface and become more resilient in the face of growing threats and asymmetric attacks. Joe Jarzombek is Director for Government, Aerospace & Defense Programs in Synopsys, Inc. He guides efforts to focus Synopsys’ global leadership in electronic design automation (EDA), silicon IP, and software security and quality solutions on addressing the needs of the public sector and the aerospace and defense communities. Jarzombek has over 30 years’ experience focused on software security, safety, and quality in embedded and networked systems and enterprise IT.

Hora

18:00 - 19:00 hs GMT+1

Organizador

Synopsys Software Integrity Group (SIG)
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Enero / 2026 246 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 29 de Enero de 2026
Mar 30 de Enero de 2026
Mié 31 de Enero de 2026
Jue 01 de Enero de 2026
Vie 02 de Enero de 2026
Sáb 03 de Enero de 2026
Dom 04 de Enero de 2026
Lun 05 de Enero de 2026
Mar 06 de Enero de 2026
Mié 07 de Enero de 2026
Jue 08 de Enero de 2026
Vie 09 de Enero de 2026
Sáb 10 de Enero de 2026
Dom 11 de Enero de 2026
Lun 12 de Enero de 2026
Mar 13 de Enero de 2026
Mié 14 de Enero de 2026
Jue 15 de Enero de 2026
Vie 16 de Enero de 2026
Sáb 17 de Enero de 2026
Dom 18 de Enero de 2026
Lun 19 de Enero de 2026
Mar 20 de Enero de 2026
Mié 21 de Enero de 2026
Jue 22 de Enero de 2026
Vie 23 de Enero de 2026
Sáb 24 de Enero de 2026
Dom 25 de Enero de 2026
Lun 26 de Enero de 2026
Mar 27 de Enero de 2026
Mié 28 de Enero de 2026
Jue 29 de Enero de 2026
Vie 30 de Enero de 2026
Sáb 31 de Enero de 2026
Dom 01 de Enero de 2026

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado