About this event
Join us for an informative online seminar focused on automating the generation of Software Bill of Materials (SBOMs) to comply with regulatory requirements and improve vulnerability management processes. Our expert panel will discuss the importance of SBOMs and how they provide a comprehensive list of all software components and their dependencies in a given system, making it easier to identify vulnerabilities and their potential impact.
During the seminar, we will showcase practically how our ONEKEY platform automates SBOM generation and streamlines vulnerability management processes, providing a seamless and efficient solution for product security teams.
We will cover the latest developments in SBOM formats and how automated SBOM generation can increase the efficiency of the product security lifecycle. This seminar is ideal for anyone involved in product security, including Product Security Teams, IT Security Specialists, Head of Product Security, IoT/OT Security Managers, CISOs, and related roles.
Don't miss this opportunity to gain insights into strategies for automating SBOM generation, improve vulnerability management processes, and reduce risks associated with compliance with regulatory requirements. Join us to stay ahead of the curve and enhance your understanding of product security.
If you can't attend the live session, register anyway to receive the on-demand recording.
Jan is an experienced CEO. He worked for IBM, as COO for an international VC firm, founded cybersecurity companies, supported IPOs and served as officer of a NASDAQ-listed holding. Now at ONEKEY, as CEO, he focuses on international growth & to provide a world-class IoT/OT software security solution.
As a CREST-certified ethical hacker, Florian responsibly reported dozens of zero-day vulnerabilities to software vendors and gained expertise in pentesting and security assessments of IoT devices. Now, as CTO at ONEKEY, he aids organizations by automating IoT security.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.