The surge in high-profile software supply chain attacks has exposed a soft underbelly of modern computing and prompted a major global response to address security defects and third-party risk management.
This fully immersive virtual event will explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.
Through the Call for Presentations, a conference committee will accept speaker submissions for possible inclusion in the program at the 2025 Supply Chain Security and Third-Party Risk Summit.
Tips for Acceptance:
Be Original – Proposed talks should be original and not have been presented at other events. We are looking for new, innovative talks that have not been seen elsewhere.
Focused – This is NOT an general IT/cybersecurity conference, and all proposed talks should directly address supply chain cybersecurity and third-party risk.
Submit Early — We typically receive hundreds of submissions for our events, and by submitting early, you will have a better chance of being accepted, as submissions will be reviewed on an ongoing basis.
Not a Sales Pitch – Sessions should be educational and NOT be masked sales pitch. When attendees smell the faintest scent of a sales pitch, they immediately put up their guard and speakers lose creditability. Show you understand a problem or technical challenge, and help people learn. You’ll earn credibility and people will notice who you are and what you do.