Back to Search Begin New Search Save Search Auto-Notify
Acquisition Oversight for Software Assurance
Software management is too frequently ignored or addressed piecemeal in systems. Cyber threat actors take advantage of gaps and errors in their attacks, which they can accomplish throughout the lifecycle. Exploiting these gaps and errors allows them to compromise processes, practices, and procedures that touch a system’s design, component development, and supply chain to bypass controls and leverage available vulnerabilities. Key softwar...
March 11, 2026
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Back to Search Begin New Search