Practical advice for protecting your digital supply chain: A realistic top 5 list

On-Demand Webcast|1 hour

There’s a lot of advice out there for how to secure the hardware, firmware and software that encompasses your company’s digital supply chain. But not all of it is immediately feasible for everyone, especially for organizations that are limited in resources or lacking security maturity. 
Fortunately, this webcast will make sense of this chaotic jumble of advice and narrow it down to a very digestible top-five list of realistic, pragmatic steps your company can take to shore up their digital supply chain strategies. We’ll look at what foundational solutions and strategies you should be prioritizing first, and which steps can wait until after you have the basic building blocks down.


Paul Asadoorian

Principal Security Evangelist


Paul Asadoorian is currently the Principal Security Evangelist for Eclypsium. Paul is also the founder of Security Weekly, a security podcast network (acquired by CyberRisk Alliance in 2020) and now serves as a podcast host for Paul's Security Weekly. Paul's previous roles have been spent “in the trenches” coding in Python, testing security products, and evaluating and implementing open-source software. Paul's career began by implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking firmware, web applications, or Linux, Paul can be found researching his next set of headphones, devices for smoking meat, and e-bikes.


Bill Brenner

VP, Content

CyberRisk Alliance

Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for and senior writer for