Official Website link
Date: February 28, 2026
Track: CXO Speakers
Format: Presentation
Overview
Modern enterprises are only as secure as their weakest link in the digital supply chain: a compromised SaaS provider, a vulnerable open‑source library, a misconfigured cloud partner or a third‑party contractor with excessive access. In 2026, attackers are no longer targeting the enterprise directly; they are weaponizing dependencies, exploiting trust relationships and moving laterally through the ecosystem. For CISOs, this means security can no longer stop at the firewall; it must extend into the health, posture and behavior of every connected vendor, platform and component.
Key Topics
- The new attack surface: why supply chain is the primary battleground
- Mapping and prioritizing digital dependencies
- Building a layered defense for the extended ecosystem