When building and acquiring software-reliant systems, the stakes are high and the risks can be daunting. Today’s systems are built with newly developed software, along with legacy, COTS, and open source applications, libraries, and data. Leveraging existing software components can help deliver capability at reduced cost, but what are the risks? How can you know what’s in the software that powers your mission-critical capabilities and how resilient it is to attacks?
When you consider additional factors such as need to increase the pace of acquisition and the use of multiple providers in different teaming arrangements, it’s clear that new tactics are needed to manage and secure a supply chain that includes software.
Who Should Attend
Anyone working with projects or programs that require the acquisition of software-intensive systems, including DoD or other government program managers, project managers, software engineers, and contractors.
- learn methods for understanding, managing, and securing supply chains that involve software
- hear from leading experts in the field of software engineering about methods, technical innovations, and practices
- find innovative approaches to the challenges within their organizations
- network and participate in informal “Ask an Expert” sessions
This symposium is the second in a series of events covering different topics in software and cyber engineering.