With the increasing clarity in the application of SBOM, more and more critical infrastructure industries are engaging in PoC. This prompts us to consider whether we are adequately prepared for the development of SBOM. We know that merely listing the software and versions of asset through SBOM is insufficient to improve supply chain security. In light of this, we will deep into the concept, generation, and application of SBOM. Once we have SBOM, what technologies should we align with to effectively apply the concept? Additionally, we will also analyze the current use of SBOM in global critical infrastructure industries to illustrate the concerns it brings.
TOPIC / TRACK
AIoT & Hardware Security Summit
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone
LEVEL
General General sessions explore new cybersecurity knowledge and non-technical topics, ideal for those with limited or no prior cybersecurity knowledge.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
SBOM
Supply Chain Security
Critical Infrastructure Protection
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。