
Utility Professionals Group
This group is the default community for every Energy Central registered member. We discuss and share a variety of topics related to the global power industry.
Shared Link
White House rolls out pipeline, supply chain security initiatives as companies pledge billions in cyber spending - CyberScoop
Protecting both sides of the software supply chain (vendor/customer) requires tools and processes specific to each party. Consumers use NIST compliant Cyber Supply Chain Risk Management (C-SCRM) methods and tools combined with NTIA Software Bill of Materials (SBOM) to proactively perform a comprehensive software risk assessment, before any attempt to install a software package. This prevents Ransomware and other forms of malware from getting a foothold in a digital ecosystem, where it can carry out it's nefarious deeds. An SBOM also enables the ongoing monitoring of risks and vulnerabilities that may arise, after a software product has been installed, providing consumers visibility to new risks, reactively.
White House rolls out pipeline, supply chain security initiatives as companies pledge billions in cyber spending - CyberScoop
It's important to understand that the software supply chain consists of two distinct phases, that must be secured: Software Development Life Cycle (SDLC) supply chain activities, performed by a software vendor Cyber Supply Chain Risk Management (C-SCRM) a
Discussions
No discussions yet. Start a discussion below.
Get Published - Build a Following
The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.
If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.
Sign in to Participate