<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Managing Supply Chain Security Risks in the Enterprise


Think About Your Audience Before Choosing a Webinar Title

Sponsored by WHITESOURCE

Tuesday, October 19, 2021
1 p.m. ET

The sharp increase in attacks on organizations’ software supply chains requires policy makers to address supply chain risks with a more structured approach. President Biden’s cybersecurity executive order and NTIA’s software component transparency initiative aim to strengthen supply chain security through advanced visibility into organizations’ software bills of materials (SBOM).

It’s crucial to formulate a comprehensive strategy and find ways to secure the software supply chain against a wide range of risks in today’s software development ecosystem.

In this panel, our experts discuss the means to track supply chain risks and map out the steps an organization should take to manage and secure the open source supply chain by gaining full visibility and control over open source dependencies.

Susan St. Clair
Director of Product Management - WhiteSource
Susan St. Clair is a passionate cybersecurity advocate at WhiteSource Software, the remediation-centric application security software company. Possessing over 14 years of product management and strategy experience, Susan is responsible for raising awareness of the market need for the newest generation of application security testing solutions and challenges while supporting WhiteSource Software’s product roadmap and overall direction. Susan is certified in pen testing from the IACRB, and in her spare time, she enjoys educating application development teams on ways to streamline their work processes, raising awareness of API security in the AppSec community, and running in races benefiting charities such as Easterseals, SickKids and Camp Ooch.
John Walsh
Senior Product Marketing Manager Conjur - CyberArk
John Walsh has served the realm as a lord security developer, product manager and open source community manager for more than 15 years, working on cybersecurity products such as Conjur, LDAP, Firewall, JAVA Cyptography, SSH, and PrivX. He has a wife, two kids, and a small patch of land in the greater Boston area, which makes him ineligible to take the black and join the Knight’s Watch, but he’s still an experienced cybersecurity professional and developer.
Ricardo Sueiras
Principal Advocate in Open Source - AWS
Ricardo is an enterprise evangelist at Amazon Web Services; he works with enterprise executives and technology leaders to help them adopt the cloud and transform their businesses. He has over twenty years of experience leading emerging technology and innovation programmes and has been working with cloud technologies since 2008. He is passionate about cloud, innovation and open source and is excited about how cloud accelerates and amplifies customers’ ability to innovate. Prior to joining AWS Ricardo worked for one of the largest professional services firms. For the past few years he has been leading emerging technology and innovation programmes.
Chris Taylor
Executive Director, Cyber Security - MSCI
Chris Taylor is the director of application security at MSCI where he helps teams integrate modern DevSecOps capabilities and practices within their application development lifecycle and also leads penetration testing services. Prior to joining MSCI, he was the head of cyber defense at BNP Paribas US where he was responsible for a team of engineers who led penetration testing and incident response for US entities as well as cyber resiliency for systems designated by the SEC as Core Financial Systems.  Before MSCI, Chris worked for Booz Allen Hamilton where he led several notable efforts including governance improvements at Merck immediately following not-Petya, the lead author for the SWIFT Customer Security Program controls following the attack on the central bank of Bangladesh, security architecture for Target immediately following their hack, oversight on behalf of political appointees in the Office of the Secretary of Defense for major intrusions of classified networks; assisting with cyber workforce, cyber strategy, and cyber budgeting framework efforts; and providing input into the SECDEF’s Defense Planning Guidance.  Prior to Booz Allen, Chris led cyber architecture, engineering, incident response, and security operations for a DoD special mission unit in support of enhancement activities pertaining to the 2008 DoD cyberattack. Before that, Chris spent several years as a security researcher/software developer in offensive cyber roles within the US Intelligence community. In his free time, Chris used to enjoy deployments as a US Army reserve intelligence officer to help in counter-terrorism efforts and hunting war criminals.  These days, he prefers playing pool and hiking.

OnDemand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.