<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
The Hidden Software Supply Chain Risks That Can Ruin Your 2022

Webinar

Think About Your Audience Before Choosing a Webinar Title

Sponsored by Legit Security

Legit Security Logo (1)


On Demand
Anytime

You’ve likely heard a lot of buzz about software supply chain security but it’s difficult to know where to start learning more and how to prioritize your learning curve. Are you curious about why a former product leader for an SCA solution at a Gartner Magic Quadrant-leading vendor would leave his job to create a new solution to a scarier problem in application security?

There’s been an alarming increase in software supply chain attacks in the past few years. And while you never know exactly when and how the next attack will unfold, it's certain that more software supply chain attacks will happen. Based on industry research and real-world stories from the trenches, we will examine the different types of attacks and attack combinations that today’s software supply chain attackers are using to disrupt your year. We will provide actionable tips on how to proactively mitigate those risks, speed up your reaction time and avoid disruption altogether.

In this webinar you will:

  • Gain a broad understanding of software supply chain attacks
  • Learn the three riskiest software supply chain attack patterns distilled from known frameworks
  • See how hackers exploited SDLC vulnerabilities in attacks such as SolarWinds and CodeCov
  • Get expert tips from an industry veteran that can reduce your software supply chain risk
  • Better understand how to prioritize risks so you can remediate them iteratively
  • Identify ways to mitigate risks at scale
Liav Caspi
CTO and Co-Founder, Legit Security
Liav Caspi is CTO of Legit Security and has a long background as a cybersecurity expert starting in the Israeli unit 8200 in various engineering, team lead and project management roles. In previous roles, Liav worked at Argus Cyber Security building security into automotive-oriented software. He then joined an early stage startup that was acquired by Checkmarx and led the architecture and the product management of the SCA solution, the first SaaS solution by Checkmarx dealing with open source security. In his free time, Liav enjoys technology, traveling, food and learning new languages.
Alex Babar
Software Supply Chain Security Advocate, Legit Security
Alex Babar is the Software Supply Chain Security Advocate at Legit Security. Previously, he held various product marketing and product management roles in the identity and access management security space with Ping Identity. In his free time, Alex is an avid tennis player, automotive enthusiast and aspiring home cook.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.