The surge in high-profile software supply chain attacks has exposed a soft underbelly of modern computing and prompted a major global response to address security defects and third-party risk management.
This fully immersive virtual event will explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.
Through the Call for Presentations, a conference committee will accept speaker submissions for possible inclusion in the program at the 2025 Supply Chain Security and Third-Party Risk Summit.
Tips for Acceptance:
Be Original – Proposed talks should be original and not have been presented at other events. We are looking for new, innovative talks that have not been seen elsewhere.
Focused – This is NOT an general IT/cybersecurity conference, and all proposed talks should directly address supply chain cybersecurity and third-party risk.
Submit Early — We typically receive hundreds of submissions for our events, and by submitting early, you will have a better chance of being accepted, as submissions will be reviewed on an ongoing basis.
Not a Sales Pitch – Sessions should be educational and NOT be masked sales pitch. When attendees smell the faintest scent of a sales pitch, they immediately put up their guard and speakers lose creditability. Show you understand a problem or technical challenge, and help people learn. You’ll earn credibility and people will notice who you are and what you do.
If you haven't logged in before, you'll be able to register.
Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.