Registered Attendees
Live Sessions
Technical Demos
Interactive Expo Hall
Resource Center
Mandated Software Transparency: Preparing for new government regulations, including the EU’s Cyber Resilience Act, by operationalizing Software Bills of Materials (SBOMs).
Proactive Third-Party Risk: Building a continuous vendor risk management program that goes beyond questionnaires to include rigorous technical validation of products and services.
Secure by Design: The shift-left movement and integrating automated security tools into the CI/CD pipeline to prevent vulnerabilities from reaching production.
Threat Intelligence & Vulnerability Monitoring: Leveraging curated threat intelligence feeds and vulnerability exploitability exchange (VEX) to proactively monitor for risks within your supply chain.
Evolving Adversaries: Understanding how sophisticated nation-state actors and cybercriminals are exploiting software supply chains, from code repositories to hardware and firmware.
How AI-generated code changes supply chain risk
Making SBOMs actionable, not just auditable
SecurityWeek Virtual Events Provide
Third-party risk management is reaching a breaking point. Vendor ecosystems are expanding faster than risk teams can keep up, risk signals are fragmented, and traditional approaches struggle to deliver the speed, coverage, and defensibility organizations now require. In this session, we introduce Hyper TPRM — a modern approach to third-party risk management built for scale. Hyper TPRM moves beyond questionnaire-driven processes by combining data-first intelligence, workflow, community-powered exchange models, and AI acceleration, with human confirmation where it matters most. Join us to learn how organizations are evolving their TPRM programs to:
If you’re looking to modernize your TPRM program without compromising rigor, this session will show how Hyper TPRM enables faster decisions, broader coverage, and greater confidence across the entire third-party lifecycle.
Ed Thomas
Senior Vice President
ProcessUnity
In today's digital landscape, a seamless customer experience isn’t just a luxury—it’s a revenue driver. Join Nathan Langton, Director of Product Management at Ping Identity, for an insightful exploration into how identity orchestration can transform complex, multi-brand environments into unified, high-performing journeys. Whether you’re managing a diverse portfolio of sub-brands or navigating intricate B2B and B2C transactions, orchestration provides the flexibility to protect and delight users simultaneously. Discover how to move beyond rigid IT limitations and embrace a "whiteboard-to-web" reality with no-code solutions like PingOne DaVinci. Key Takeaways:
Nathan Langton
Director of Product Management
Ping Identity
Coming soon
Ziad Ghalleb
Product Marketing Manager
Wiz
Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.
When the 2025 update from OWASP elevated Software Supply Chain Failures to a top-three risk — with the strongest consensus in the project’s history — it signaled a structural shift in how applications are built, delivered, and exploited. Modern applications are no longer built. They are composed — from open-source components, CI/CD pipelines, SaaS integrations, third-party scripts, marketing pixels, and increasingly AI-driven services. Many of these components execute not on your servers, but directly in your users’ browsers — where sensitive data is created and immediately exposed.
In this session, Gareth Bowker, Head of Security Research at Jscrambler, will examine what OWASP’s shift means for CISOs and application security leaders. Drawing on newly released third-party script research, Gareth will reveal not only the security risks of client-side dependencies, but also the data governance implications — including how third-party scripts gain real-time access to user inputs, behavioral signals, and sensitive session data. While organizations have invested heavily in SBOMs, dependency scanning, and build pipeline integrity, runtime client-side exposure remains largely unmonitored. As PCI DSS introduced mandatory controls for payment pages, OWASP has now reinforced that supply chain risk extends across the entire application surface. Attendees will leave with a clear framework for extending supply chain security beyond the edge — to the browser layer where data is born — and for turning OWASP’s signal into operational action.
Gareth Bowker
Head of Security Research
Jscrambler
Security agents perform tasks that humans used to do manually. They investigate alerts, correlate events across systems, and document findings. They need credentials to access those systems, which means they're identities that need to be managed. However, most enterprises treat agents like another API integration instead of privileged accounts, and that creates predictable gaps in access control and accountability.
This talk maps agent architectures to familiar Appsec and IAM risks. I'll show how typical implementations lead to overprivileged access, unintended data exposure, and accountability gaps. Then I'll cover practical mitigations that apply existing security principles to this new type of identity. Attendees will walk away reimagining agent integrations as an access control risk and understanding how they can leverage existing security practices for agent security.
Mudita Khurana
Staff Security Engineer
Airbnb
Third-party risk management has evolved from static questionnaire-based assessments to continuous monitoring requirements, yet many organizations still rely on hardwired decision trees and predefined compliance checklists, leaving substantial risk optimization value unrealized. This presentation introduces a comprehensive framework for autonomous, AI-driven vendor risk orchestration that transcends traditional rules-based vendor management by integrating advanced technological capabilities for real-time third-party monitoring.
The proposed framework rests on four core technological pillars.
The multi-agent system design enables specialized agents for threat prediction, vendor optimization, risk execution, and continuous monitoring to collaborate toward unified organizational objectives. Each agent operates within a stratified decision-making hierarchy encompassing strategic decisions involving long-term vendor selection policies, tactical decisions concerning medium-term vendor engagement strategies, and operational decisions executing daily vendor monitoring and incident response.
Implementation guidance addresses practical challenges of integrating autonomous vendor risk systems with existing enterprise resource planning platforms, vendor management systems, and incident response workflows. The framework incorporates robust governance controls and human oversight mechanisms to maintain stakeholder confidence while capturing benefits of intelligent automation. This presentation demonstrates how organizations can transition from reactive, static vendor assessment to predictive, self-optimizing third-party risk orchestration.
Nirajkumar Radhasharan Barot
Lead Software Developer
JPMorgan Chase
We hope your virtual experience at SecurityWeek's 2026 Supply Chain & Third-Party Risk Security Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: ProcessUnity, Wiz, Ping Identity, and Jscrambler. Stop by their booths and chat with their experts before you leave!