About this event
Software Bill of Materials (SBOMs) are rapidly becoming a cornerstone of modern software supply chain security, transparency, and compliance. However, simply producing an SBOM is not enough — the quality of the data, its completeness, accuracy, and machine-readability are what determine whether it can truly support vulnerability management, risk mitigation, and regulatory requirements.
Standards bodies like the National Telecommunications and Information Administration (NTIA) and the Cybersecurity and Infrastructure Security Agency (CISA) have defined minimum elements for SBOMs and recommended practices to scale their operational use across organizations. Emerging community guidance, including OWASP-related maturity models, highlights the importance of completeness, confidence, and lifecycle context in SBOMs.
In this 45-minute webinar, we’ll cut through the noise and show what truly makes a high-quality, actionable SBOM. You’ll learn how to evaluate your own SBOMs, understand common pitfalls, and build quality gates that align with standards and real-world risk workflows. We’ll then demonstrate how ONEKEY’s SBOM Management capabilities — including binary-based generation, version matching, license identification, and continuous monitoring — help you produce SBOMs that are not only compliant but useful for security, compliance, and lifecycle risk management.
During the session you will learn:
The session will include a live demonstration of generating and validating an SBOM, refining the data, and exporting a standards-compliant artifact that you can immediately use for vulnerability and risk workflows.
Whether you’re responsible for software security, supply chain risk management, compliance, or product assurance, this webinar will give you actionable strategies and tools to ensure your SBOMs are trustworthy, complete, and ready for real-world use.
Can’t join live? No problem — register now, and you’ll receive the on-demand recording afterward.
Hosted by
Sarah works with organizations to maximize the value of their product cybersecurity strategy. She supports them in operationalizing firmware analysis, driving adoption, and increasing risk transparency to achieve measurable security outcomes.
Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.