3rd Party Risk Management , Governance & Risk Management , Video

How to Detect Open Source Software Supply Chain Threats

Qualys India's Debashish Jyotiprakash on Steps for Building a Secure Ecosystem
Debashish Jyotiprakash, managing director, India and ASEAN, Qualys

Detecting, prioritizing and remediating open source software supply chain vulnerabilities can be challenging. CISOs can build robust strategies by having near real-time visibility of all their hybrid assets and performing remediation engineering at scale, said Debashish Jyotiprakash, managing director, India & ASEAN, at Qualys.

See Also: 2024 Global Threat Landscape Overview

"It is important to consider first-party software or volatility management or first-party software which is fundamental to the overall cybersecurity strategy that helps in proactively identifying and addressing vulnerabilities in companies’ own systems and homegrown applications," Jyotiprakash said.

In this interview with Information Security Media Group, Jyothiprakash offered insights on:

  • How CISOs can ensure accountability in assessing supply chain risks;
  • Major themes of the upcoming Qualys Security Conference;
  • Essentials for a cyber-secure and resilient enterprise.

Jyotipakash is responsible for sales, marketing, channel management and company success in the region at Qualys. He has more than 18 years of multi-industry experience and has held leadership roles at major technology companies.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.