On May 12th, 2021 President Joe Biden called for the standardization of secure code practices. After a contagion of recent publicly exposed vulnerabilities such as the Colonial Pipeline, Solarwinds, and Codecov attacks, federal agencies and the vendors they work with, have been given a timeline to comply with the 2021 Cybersecurity Executive Order. The first-ever federal mandate to secure critical software components.
WATCH:
On May 12th, 2021 President Joe Biden called for the standardization of secure code practices. After a contagion of recent publicly exposed vulnerabilities such as the Colonial Pipeline, Solarwinds, and Codecov attacks, federal agencies and the vendors they work with, have been given a timeline to comply with the 2021 Cybersecurity Executive Order. The first-ever federal mandate to secure critical software components.
WATCH:
Fewer than 50% of organizations know what software components make up their applications. The first step towards enhancing software supply chain security is knowing what is inside your apps. Getting a Software Bill of Materials (SBOM) and practicing vulnerability disclosure are outlined as new requirements when contracting with the federal government.
Developing an SBOM is the first step towards establishing accountability in cybersecurity. Next, when malicious activity is present, including in third-party software, these organizations are also responsible for reporting vulnerability disclosures.
Imagine your company had a breach today. Who else is affected? What comes next? Defining clear, vulnerability disclosure standards will save time clearing the noise, and help teams fight attacks quicker.
In this two-part webinar series, secure development professionals come to the mic to discuss how development and security communities will be affected, trends across the public and private sector, and understanding the latest developments in Executive Order news.
Developing an SBOM is the first step towards establishing accountability in cybersecurity. Next, when malicious activity is present, including in third-party software, these organizations are also responsible for reporting vulnerability disclosures.
Imagine your company had a breach today. Who else is affected? What comes next? Defining clear, vulnerability disclosure standards will save time clearing the noise, and help teams fight attacks quicker.
In this two-part webinar series, secure development professionals come to the mic to discuss how development and security communities will be affected, trends across the public and private sector, and understanding the latest developments in Executive Order news.
The National Institute of Standards and Technology (NIST) established a definition for “critical software,” in order to guide the focus of the Executive Order.
Critical Software (noun) — any software that has, or has direct software dependencies upon, one or more components with at least one additional attribute:
With a definition that scopes all stand alone software, software integral to specific devices or hardware components, and cloud based software, complying with the cybersecurity Executive Order is a goal that we all need to meet. Private sector organizations are on a timeline to get their standards together for securing critical software components, but expect to see shifts in the public sector and across other international economies soon after.
Don’t wait for the remaining phases of the 2021 Cybersecurity Executive Order to be rolled out, start preparing to meet its standards now. Stay informed with the links below, and start a free SBOM to know what software components make up your applications.
The National Institute of Standards and Technology (NIST) established a definition for “critical software,” in order to guide the focus of the Executive Order.
Critical Software (noun) — any software that has, or has direct software dependencies upon, one or more components with at least one additional attribute:
With a definition that scopes all stand alone software, software integral to specific devices or hardware components, and cloud based software, complying with the cybersecurity Executive Order is a goal that we all need to meet. Private sector organizations are on a timeline to get their standards together for securing critical software components, but expect to see shifts in the public sector and across other international economies soon after.
Don’t wait for the remaining phases of the 2021 Cybersecurity Executive Order to be rolled out, start preparing to meet its standards now. Stay informed with the links below, and start a free SBOM to know what software components make up your applications.
Sonatype Headquarters - 8161 Maple Lawn Blvd #250, Fulton, MD 20759
Tysons Office - 8281 Greensboro Drive – Suite 630, McLean, VA 22102
Australia Office - 60 Martin Place Level 1, Sydney, NSW 2000, Australia
London Office -168 Shoreditch High Street, E1 6HU London
Subscribe for all the latest software security news and events
Copyright © 2008-present, Sonatype Inc. All rights reserved. Includes the third-party code listed here. Sonatype and Sonatype Nexus are trademarks of Sonatype, Inc. Apache Maven and Maven are trademarks of the Apache Software Foundation. M2Eclipse is a trademark of the Eclipse Foundation. All other trademarks are the property of their respective owners.
Terms of Service Privacy Policy Modern Slavery Statement Event Terms and Conditions Do Not Sell My Personal Information