Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=z8jXWu7A2-A



Duration: 0:00
4 views
0


As digital infrastructure becomes increasingly interwoven with third-party code, APIs, and AI-generated components, organizations are realizing they can’t ignore the origins—or the risks—of their software. Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Sean Martin and Marco Ciappelli to unpack why software supply chain visibility has become a top concern not just for CISOs, but for CEOs as well.


Drawing from LevelBlue’s Data and AI Accelerator Report, part of their annual Futures Report series, Theresa highlights a striking correlation: 80% of organizations with low software supply chain visibility experienced a breach in the past year, while only 6% with high visibility did. That data underscores the critical role visibility plays in reducing business risk and maintaining operational resilience.


More than a technical concern, software supply chain risk is now a boardroom topic. According to the report, CEOs have the highest awareness of this risk—even more than CIOs and CISOs—because of the direct impact on brand reputation, stock value, and partner trust. As Theresa puts it, software has become the “last mile” of digital business, and that makes it everyone’s problem.


The conversation explores why now is the time to act. Government regulations are increasing, adversarial attacks are intensifying, and organizations are finally beginning to connect software vulnerabilities with business outcomes. Theresa outlines four critical actions: leverage CEO awareness, understand and prioritize vulnerabilities, invest in modern security technologies, and demand transparency from third-party providers.


Importantly, cybersecurity culture is emerging as a key differentiator. Companies that embed security KPIs across all business units—and align security with business priorities—are not only more secure, they’re also more agile. As software creation moves faster and more modular, the organizations that prioritize visibility and responsibility throughout the supply chain will be best positioned to adapt, grow, and protect their operations.


Learn more about LevelBlue: https://itspm.ag/levelblue266f6c


Note: This story contains promotional content. Learn more (https://www.itspmagazine.com/their-infosec-story) .


Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber (https://twitter.com/LevelBlueCyber) ]


On LinkedIn | https://www.linkedin.com/in/theresalanowitz/


Resources


To learn more, download the complete findings of the LevelBlue Threat Trends Report here: https://itspm.ag/levelbyqdp


To download the 2025 LevelBlue Data Accelerator: Software Supply Chain and Cybersecurity report, visit: https://itspm.ag/lbdaf6i


Learn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblue


Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs


Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/


Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up


Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story




Other Videos By ITSPmagazine


2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream & the Last Stand of Creativity
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | With Theresa Lanowitz
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29The Energy Transition: Not if, but When | Susan Hunt Stevens
2025-07-29ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-28ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-27ThreatLocker Will Unveils Game-Changing Zero Trust Innovations at Black Hat 2025 | Booth #1933
2025-07-25From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurit...
2025-07-25From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurit...
2025-07-24Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akam...
2025-07-24Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akam...