Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
360View: Securing the Enterprise Supply Chain
Channel

360View: Securing the Enterprise Supply Chain

Truth in IT
03/20/2025

Live Webinar – March 20, 2025 | 1 PM ET   

The Hidden Risks in Your Vendor & Software Ecosystem


From software supply chains to vendor access, enterprises today face growing risks from third-party relationships. Whether it’s securing software dependencies or controlling privileged vendor access, ensuring zero trust security is critical to mitigating vulnerabilities, preventing breaches, and maintaining compliance.


360View: Securing the Enterprise Supply Chain
brings together experts to explore critical strategies for protecting IT ecosystems against supply chain attacks and vendor-based risks.

What You’ll Learn:

✅ Vendor Access & Zero Trust – How to secure third-party contractors, MSPs, and suppliers with least-privilege controls.
✅ Software Supply Chain Protection – Eliminating vulnerabilities in open-source & proprietary code.
✅ Risk Management & Compliance – The role of audit trails, automation, and AI in securing supply chains.


Win one of ten (10) $100 Amazon Gift Cards!    but only attendees are eligible!
Agenda:

Time (ET) Session Resources
12:00 – 12:05 PM Welcome & Opening Commentary  
12:05 – 12:25 PM Leostream – Securing Vendor Access
12:25 – 12:30 PM Key Takeaways & Giveaway #1       
12:30 – 12:50 PM Lineaje – Software Supply Chain Security
12:50 – 12:55 PM Closing Commentary, Giveaway #2     



Who should sponsor?

Companies offering third-party access management, privileged identity solutions, software supply chain security, and zero trust architecture solutions would benefit from sponsoring this event. To inquire about sponsorship, contact us at info@truthinit.com.

Categories:
  • » Events » 360View
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Cybersecurity » Zero Trust
Tags:

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


Live Webinar – March 20, 2025 | 1 PM ET   

The Hidden Risks in Your Vendor & Software Ecosystem


From software supply chains to vendor access, enterprises today face growing risks from third-party relationships. Whether it’s securing software dependencies or controlling privileged vendor access, ensuring zero trust security is critical to mitigating vulnerabilities, preventing breaches, and maintaining compliance.


360View: Securing the Enterprise Supply Chain
brings together experts to explore critical strategies for protecting IT ecosystems against supply chain attacks and vendor-based risks.

What You’ll Learn:

✅ Vendor Access & Zero Trust – How to secure third-party contractors, MSPs, and suppliers with least-privilege controls.
✅ Software Supply Chain Protection – Eliminating vulnerabilities in open-source & proprietary code.
✅ Risk Management & Compliance – The role of audit trails, automation, and AI in securing supply chains.


Win one of ten (10) $100 Amazon Gift Cards!    but only attendees are eligible!
Agenda:

Time (ET) Session Resources
12:00 – 12:05 PM Welcome & Opening Commentary  
12:05 – 12:25 PM Leostream – Securing Vendor Access
12:25 – 12:30 PM Key Takeaways & Giveaway #1       
12:30 – 12:50 PM Lineaje – Software Supply Chain Security
12:50 – 12:55 PM Closing Commentary, Giveaway #2     



Who should sponsor?

Companies offering third-party access management, privileged identity solutions, software supply chain security, and zero trust architecture solutions would benefit from sponsoring this event. To inquire about sponsorship, contact us at info@truthinit.com.

Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Browse Playlist
  •  

                Channel's Comments: 360View: Securing the Enterprise Supply Chain

                Chat

                Featuring

                Upcoming Webinar Calendar

                • 03/17/2026
                  06:00 AM
                  03/17/2026
                  L'importance cruciale de l'ITDR pour 2026 et au-delà
                  https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
                • 03/18/2026
                  01:00 PM
                  03/18/2026
                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                  https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
                • 03/19/2026
                  11:00 AM
                  03/19/2026
                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                  https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
                • 03/19/2026
                  01:00 PM
                  03/19/2026
                  Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                  https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
                • 03/26/2026
                  01:00 AM
                  03/26/2026
                  Reclaim Network Clarity and Accountability with Netskope DEM
                  https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
                • 03/26/2026
                  05:00 AM
                  03/26/2026
                  ITDR as an Integral Component of Critical Security Architecture
                  https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                  https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  Making GPUs Available On Demand (Without Breaking the Budget)
                  https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
                • 04/08/2026
                  01:00 PM
                  04/08/2026
                  Managing Configuration at Scale Across Group Policy and Intune
                  https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

                Upcoming Spotlight Events

                • Mar
                  18

                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                  03/18/202601:00 PM ET
                  • Mar
                    19

                    Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                    03/19/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events

                        Upcoming Industry Events

                        • Mar
                          17

                          L'importance cruciale de l'ITDR pour 2026 et au-delà

                          03/17/202606:00 AM ET
                          • Mar
                            19

                            Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                            03/19/202611:00 AM ET
                            • Mar
                              26

                              Reclaim Network Clarity and Accountability with Netskope DEM

                              03/26/202601:00 AM ET
                              More events
                              Truth in IT
                              • Sponsor
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Preference Management
                              Desktop version
                              Standard version