Panel Discussion
Securing the Software Supply Chain: Preventing Code Tampering, Reducing Attack Surface, and Protecting Rail Operations, Minimising risk in building new software.
This session delivers a practical framework for securing the full software lifecycle, from code commit to live deployment, tackling the industry’s fastest-growing cyber risk: supply chain compromise.
Code integrity, how do we protect and ensure integrity across the full development and deployment chain, minimising risk to the software supply chain.
Embedding cyber security requirements into procurement and specification, eliminating your weakest links
Third-party cyber assurance, implementing and applying risk-based supplier standards to reduce software attack surfaces.
Continuous validation what can we learn from other industries in preventing in-transit code manipulation before production deployment.