Webinar

Measuring and Managing: How to Leverage C-SCRM in Procurement

Thursday, June 26
11AM PT / 2PM ET
Featuring a Special Guest speaker from
Untitled (140 x 40 px)

Join Exiger and a special guest speaker from Forrester for a forward-looking webinar exploring how recent advances in software supply chain security are transforming federal procurement—empowering legal, compliance, and contracting teams to play a more active role in ensuring cybersecurity from acquisition through deployment.

Traditionally, supplier/vendor due diligence and third-party risk management (TPRM) resolves to the legal and compliance or financial management of a company or agency. When buying technology products, these folks often delegate cybersecurity approval – scans and reviews of information security documents – to technical personnel who are part of a different department, who run one-time scans or reviews, and are overburdened with other technical tasks.

Recent technical and regulatory advances in software supply chain security capabilities make it possible for technical assessors to do a faster and more thorough job, but also for contracts and compliance people to enforce terms and conditions for product security, both pre-procurement and post-deployment.

Why Join?

This discussion will cover:

  • How SBOMs and binary analysis enhance transparency and due diligence

  • The evolving role of non-technical stakeholders in cybersecurity approvals

  • Best practices for integrating software supply chain security into procurement processes

  • Practical steps for enforcing security terms in vendor contracts

Empower smarter procurement—register today.
JC Herz
SVP, Cyber Supply Chain, Exiger
Janet Worthington
Senior Analyst, Forrester, Guest Speaker

Register Now

All webinar registrants will receive access to an on-demand recording after the live presentation.

Demo The
Exiger Platform