Webinar

Software Supply Chain Secrets: The Weak Links Attackers Exploit

SBOMs are essential, but attackers know how to bypass them. Join an OPSWAT expert to uncover the 7 most overlooked vulnerabilities in software and AI project supply chains and learn how to close the gaps. From hidden dependencies to stale components, discover practical strategies to strengthen your defenses with automated scanning, risk scoring, and broader supply chain security.

DATE: October 23, 2025
TIME: 10:00AM SGT | 11:00AM CEST | 2:00PM EDT
Share this Webinar

What You’ll Learn

Discover how attackers exploit supply chain blind spots and how to build a stronger,
more resilient security strategy.

The 7 Weak Links

Explore real-world risks, from hidden dependencies and unmaintained packages to pipeline integrity threats.

Beyond SBOMs

Understand SBOM limitations and why they must be paired with automated scanning, proactive DLP, and broader mitigation measures.

Best Practices & Standards

Get actionable guidance on aligning with SBOM standards (CISA, NIST, FDA, ISO, CERT-In) and global regulations.

Featured Speaker

Headshot of Georg Prichici, VP of Product, File Security at OPSWAT
George Prichici
VP, Products, OPSWAT

George Prichici

VP, Products

George Prichici is the VP of Products at OPSWAT, leading the Application Security PLU. George’s background in technology spans over 15 years, in both product management and software engineering leadership positions. He’s a certified cloud solution architect and his focus and interest is in cybersecurity, cloud infrastructure, and machine learning.

Headshot of Georg Prichici, VP of Product, File Security at OPSWAT

Secure Your Supply Chain Today

Don’t let attackers exploit weak links in your software and AI supply chains. Register now to gain actionable insights, strategies, and best practices from OPSWAT experts.