3rd Party Risk Management , Governance & Risk Management , Video
How to Detect Open Source Software Supply Chain Threats
Qualys India's Debashish Jyotiprakash on Steps for Building a Secure EcosystemDetecting, prioritizing and remediating open source software supply chain vulnerabilities can be challenging. CISOs can build robust strategies by having near real-time visibility of all their hybrid assets and performing remediation engineering at scale, said Debashish Jyotiprakash, managing director, India & ASEAN, at Qualys.
See Also: Expel: Firms Still Threatened by Old Vulnerabilities
"It is important to consider first-party software or volatility management or first-party software which is fundamental to the overall cybersecurity strategy that helps in proactively identifying and addressing vulnerabilities in companies’ own systems and homegrown applications," Jyotiprakash said.
In this interview with Information Security Media Group, Jyothiprakash offered insights on:
- How CISOs can ensure accountability in assessing supply chain risks;
- Major themes of the upcoming Qualys Security Conference;
- Essentials for a cyber-secure and resilient enterprise.
Jyotipakash is responsible for sales, marketing, channel management and company success in the region at Qualys. He has more than 18 years of multi-industry experience and has held leadership roles at major technology companies.