YoVDO

Supply Chain Security Courses

Securing the Nation's Secrets, Infrastructure, and Democracy - Counterintelligence in the Digital Age
The Aspen Institute via YouTube
Supply Chain Security with Dependency Track
OWASP Foundation via YouTube
Mitigate Risks in Code - Protect Your Software-based Supply Chain
OWASP Foundation via YouTube
Changed Responsibilities in Modern Development Practices
OWASP Foundation via YouTube
OWASP CycloneDX - Software Bill of Materials Standard
OWASP Foundation via YouTube
Security Begins with Secure Development Environments
OWASP Foundation via YouTube
Secure Application Design with High Data Privacy Requirements
OWASP Foundation via YouTube
Offensive Threat Models Against the Supply Chain
OWASP Foundation via YouTube
Supply Chain Anarchy - Trojaned Binaries in the Java Ecosystem
OWASP Foundation via YouTube
High-Security, Zero-Connectivity and Air-Gapped Clouds - Delivering Complex Software with OCM and Flux
CNCF [Cloud Native Computing Foundation] via YouTube
< Prev Page 11 Next >