Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW
RSS
Channel info
360View: Securing the Enterprise Supply Chain
Channel

360View: Securing the Enterprise Supply Chain

Truth in IT
03/20/2025

Live Webinar – March 20, 2025 | 1 PM ET   

The Hidden Risks in Your Vendor & Software Ecosystem


From software supply chains to vendor access, enterprises today face growing risks from third-party relationships. Whether it’s securing software dependencies or controlling privileged vendor access, ensuring zero trust security is critical to mitigating vulnerabilities, preventing breaches, and maintaining compliance.


360View: Securing the Enterprise Supply Chain
brings together experts to explore critical strategies for protecting IT ecosystems against supply chain attacks and vendor-based risks.

What You’ll Learn:

✅ Vendor Access & Zero Trust – How to secure third-party contractors, MSPs, and suppliers with least-privilege controls.
✅ Software Supply Chain Protection – Eliminating vulnerabilities in open-source & proprietary code.
✅ Risk Management & Compliance – The role of audit trails, automation, and AI in securing supply chains.


Win one of ten (10) $100 Amazon Gift Cards!    but only attendees are eligible!
Agenda:

Time (ET) Session Resources
12:00 – 12:05 PM Welcome & Opening Commentary  
12:05 – 12:25 PM Leostream – Securing Vendor Access
12:25 – 12:30 PM Key Takeaways & Giveaway #1       
12:30 – 12:50 PM Lineaje – Software Supply Chain Security
12:50 – 12:55 PM Closing Commentary, Giveaway #2     



Who should sponsor?

Companies offering third-party access management, privileged identity solutions, software supply chain security, and zero trust architecture solutions would benefit from sponsoring this event. To inquire about sponsorship, contact us at info@truthinit.com.

Categories:
  • » Events » 360View
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Cybersecurity » Zero Trust
Tags:

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


Live Webinar – March 20, 2025 | 1 PM ET   

The Hidden Risks in Your Vendor & Software Ecosystem


From software supply chains to vendor access, enterprises today face growing risks from third-party relationships. Whether it’s securing software dependencies or controlling privileged vendor access, ensuring zero trust security is critical to mitigating vulnerabilities, preventing breaches, and maintaining compliance.


360View: Securing the Enterprise Supply Chain
brings together experts to explore critical strategies for protecting IT ecosystems against supply chain attacks and vendor-based risks.

What You’ll Learn:

✅ Vendor Access & Zero Trust – How to secure third-party contractors, MSPs, and suppliers with least-privilege controls.
✅ Software Supply Chain Protection – Eliminating vulnerabilities in open-source & proprietary code.
✅ Risk Management & Compliance – The role of audit trails, automation, and AI in securing supply chains.


Win one of ten (10) $100 Amazon Gift Cards!    but only attendees are eligible!
Agenda:

Time (ET) Session Resources
12:00 – 12:05 PM Welcome & Opening Commentary  
12:05 – 12:25 PM Leostream – Securing Vendor Access
12:25 – 12:30 PM Key Takeaways & Giveaway #1       
12:30 – 12:50 PM Lineaje – Software Supply Chain Security
12:50 – 12:55 PM Closing Commentary, Giveaway #2     



Who should sponsor?

Companies offering third-party access management, privileged identity solutions, software supply chain security, and zero trust architecture solutions would benefit from sponsoring this event. To inquire about sponsorship, contact us at info@truthinit.com.

Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Browse Playlist
  •  

                Channel's Comments: 360View: Securing the Enterprise Supply Chain

                Chat

                Featuring

                Upcoming Webinar Calendar

                • 05/12/2026
                  01:00 PM
                  05/12/2026
                  Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                  https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
                • 05/12/2026
                  11:30 PM
                  05/12/2026
                  Implementing Effective Strategies for Active Directory Security and Data Protection
                  https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
                • 05/13/2026
                  01:00 AM
                  05/13/2026
                  Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                  https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
                • 05/13/2026
                  05:00 AM
                  05/13/2026
                  Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                  https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
                • 05/19/2026
                  01:00 PM
                  05/19/2026
                  Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                  https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
                • 05/20/2026
                  08:00 AM
                  05/20/2026
                  Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                  https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
                • 05/20/2026
                  10:00 PM
                  05/20/2026
                  APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                  https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
                • 05/21/2026
                  11:00 AM
                  05/21/2026
                  The Autonomous Era: Orchestrating a Resilient Enterprise
                  https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
                • 05/27/2026
                  04:00 AM
                  05/27/2026
                  Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                  https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
                • 05/27/2026
                  10:00 AM
                  05/27/2026
                  Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                  https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
                • 05/28/2026
                  01:00 PM
                  05/28/2026
                  AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                  https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
                • 06/02/2026
                  01:00 PM
                  06/02/2026
                  Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                  https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
                • 06/04/2026
                  02:00 AM
                  06/04/2026
                  Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                  https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
                • 06/16/2026
                  07:00 AM
                  06/16/2026
                  Transforming Data Risk into Actionable Priorities: What to Address First
                  https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

                Upcoming Events

                • May
                  12

                  Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                  05/12/202601:00 PM ET
                  • May
                    12

                    Implementing Effective Strategies for Active Directory Security and Data Protection

                    05/12/202611:30 PM ET
                    • May
                      13

                      Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202601:00 AM ET
                      • May
                        13

                        Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                        05/13/202605:00 AM ET
                        • May
                          19

                          Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                          05/19/202601:00 PM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version