Software Supply Chain Security, AI, and Regulation

Subscribers:
99,400
Published on ● Video Link: https://www.youtube.com/watch?v=Z2m7aAMR9lA



Duration: 0:00
41 views
0


Mitch Ashley, VP & Practice Lead, DevOps and Application Development, Futurum Group
Tyler Warden, SVP, Product, Sonatype

Examine how AI adoption and evolving regulations reshape software supply chain security landscape with analysts and experts who will analyze emerging trends, compliance requirements, and AI's dual role as both risk and solution, offering practical insights for security teams adapting to these modern, interconnected challenges.

https://www.rsaconference.com/usa




Other Videos By RSA Conference


2025-06-02Generative AI Meets Identity Governance: Automating the Overlooked
2025-06-02World on the Brink: War, Geopolitics and Cybersecurity
2025-06-02Introducing a New “Kill Chain” Taxonomy for Combating Retail Fraud
2025-06-02Hollywood’s Take on Cyber Conflict
2025-06-02CISOs: Elevate Strategic Impact and Unlock New Career Paths
2025-06-02AI-Enabled Cybercrime: Separating Hype from Reality
2025-06-02Hello It’s Me, I’m the User: DBIR Insights on the Use of Stolen Credentials
2025-06-02Futureproofing Cyber Ahead of the Next Wave of Emerging Tech
2025-06-02RSAC™ Innovation Showcase: Mastering OT Cyber Readiness: Strategies & Techniques
2025-06-02Demystifying CTFs
2025-06-02Software Supply Chain Security, AI, and Regulation
2025-06-02UK's Cybersecurity Revolution: Professionalization's Global Impact
2025-06-02Global Cyber Policy | Inglis (MITRE) & Keast-Butler (GCHQ) | RSAC 2025
2025-06-02Why Democratizing Cybersecurity Is Good for Business
2025-06-02Defeating Ransomware: A 360° Review of the RTF Four Years On
2025-06-02Shaping Cybersecurity: How Regulation Shapes Operational Cyber Defense
2025-06-01Safety and Security of LLM Agents: Challenges and Future Directions
2025-06-01Damages: A Father And Son Discuss How the Digital Is Impacting Self-Image
2025-06-01The Value I Bring Is that I Don't Know Anything
2025-06-01Private Equity Tightrope: The Balance of Oversight for Portfolio Companies
2025-06-01Hacking Exposed: Next-Generation Tactics, Techniques & Procedures