Beyond Dependencies: The Real Picture of Software Supply Chain Security

Supply Chain Microsummit @ Black Hat USA Las Vegas, NV, USA
1 / 59
Slide 1 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 2 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 3 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 4 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 5 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 6 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 7 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 8 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 9 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 10 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 11 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 12 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 13 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 14 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 15 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 16 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 17 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 18 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 19 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 20 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 21 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 22 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 23 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 24 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 25 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 26 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 27 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 28 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 29 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 30 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 31 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 32 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 33 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 34 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 35 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 36 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 37 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 38 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 39 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 40 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 41 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 42 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 43 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 44 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 45 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 46 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 47 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 48 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 49 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 50 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 51 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 52 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 53 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 54 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 55 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 56 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 57 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 58 of Beyond Dependencies: The Real Picture of Software Supply Chain Security
Slide 59 of Beyond Dependencies: The Real Picture of Software Supply Chain Security

Abstract

40-minute Summit Session at Black Hat USA 2025 Supply Chain Micro Summit: the real picture of software supply chain security beyond dependencies.

Embed This Presentation

See Also

supply-chain sbom