Intel and Threatpost Host On-Demand Webinar on Hardware Security and Supply Chain Transparency

Summary: Threatpost and Intel Security host a webinar featuring Jeff Esposito and Tom Garrison, who discuss hardware innovation, Ponemon Institute research, and supply chain transparency to help CISOs navigate dynamic threats.

Threatpost and Intel Security collaborated on this on-demand webinar designed to assist stakeholders in navigating a complex threat landscape. The session explores innovation strategies that enable security professionals to maintain a proactive stance against emerging risks.

Threatpost Publisher Jeff Esposito and Intel Security’s Tom Garrison lead the discussion on the latest research from Intel’s partnership with the Ponemon Institute. The session delves into specific findings, offering actionable insights for CISOs and business stakeholders looking to enhance their security posture.

Discussion topics include innovating hardware security, strategic partnerships, and cybersecurity budgeting. Participants learn methods to reduce the attack surface for businesses while addressing challenges related to organizational transparency and establishing effective infrastructure visibility.

Attendees are encouraged to review the report prior to the session. The on-demand format ensures accessibility, allowing viewers to watch and share the program at their convenience without attending a live stream.

Key facts

  • Intel Security partnership with Ponemon Institute
  • Hardware security innovation focus
  • CISO and business stakeholder audience
  • On-demand webinar format

Why it matters

Foundational hardware security and supply chain transparency enable organizations to maintain defense assurance against evolving threats and manage risk effectively in a modern enterprise environment.

X profile@threatposthttps://twitter.com/threatpost/
Embedded content for: Intel and Threatpost Host On-Demand Webinar on Hardware Security and Supply Chain Transparency