On-Demand Webinar

Measuring and Managing: How to Leverage C-SCRM in Procurement

Featuring a Special Guest speaker from
Untitled (140 x 40 px)

Join Exiger and a special guest speaker from Forrester for a forward-looking webinar exploring how recent advances in software supply chain security are transforming federal procurement—empowering legal, compliance, and contracting teams to play a more active role in ensuring cybersecurity from acquisition through deployment.

Traditionally, supplier/vendor due diligence and third-party risk management (TPRM) resolves to the legal and compliance or financial management of a company or agency. When buying technology products, these folks often delegate cybersecurity approval – scans and reviews of information security documents – to technical personnel who are part of a different department, who run one-time scans or reviews, and are overburdened with other technical tasks.

Recent technical and regulatory advances in software supply chain security capabilities make it possible for technical assessors to do a faster and more thorough job, but also for contracts and compliance people to enforce terms and conditions for product security, both pre-procurement and post-deployment.

Why Join?

This discussion will cover:

  • How SBOMs and binary analysis enhance transparency and due diligence

  • The evolving role of non-technical stakeholders in cybersecurity approvals

  • Best practices for integrating software supply chain security into procurement processes

  • Practical steps for enforcing security terms in vendor contracts

Empower smarter procurement—register today.
JC Herz
SVP, Cyber Supply Chain, Exiger
Janet Worthington
Senior Analyst, Forrester, Guest Speaker

Watch the On-Demand Webinar

All webinar registrants will receive access to an on-demand recording after the live presentation.

Demo The
Exiger Platform