{"id":4883,"date":"2024-01-09T14:46:24","date_gmt":"2024-01-09T14:46:24","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4883"},"modified":"2024-01-09T14:58:13","modified_gmt":"2024-01-09T14:58:13","slug":"using-sboms-to-reduce-third-party-risks","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/","title":{"rendered":"Using SBOMs to Reduce Third-Party Risks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Summary: As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure. SBOMs are quickly gaining momentum as a primary way to expose weaknesses in the supply chain and decrease supply chain threats. <\/em><\/p>\n<p>Since President Biden\u2019s <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">2021 Executive Order<\/a> made Software Bills of Materials mandatory for federal contractors, <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/sbom-recipe-for-avoiding-a-disaster\/\" target=\"_blank\" rel=\"noopener\">SBOMs<\/a> have become an increasingly high agenda priority for security departments of all industries. With supply chain threats predicted to cost the world <a href=\"https:\/\/cybersecurityventures.com\/software-supply-chain-attacks-to-cost-the-world-60-billion-by-2025\/\" target=\"_blank\" rel=\"noopener\">$60 billion<\/a> annually by next year, they have become a bigger focus. So, how do SBOMs reduce <a href=\"https:\/\/www.gartner.com\/en\/legal-compliance\/insights\/third-party-risk-management\" target=\"_blank\" rel=\"noopener\">third-party risks<\/a>, and how can critical infrastructure sectors leverage them to their best advantage?<\/p>\n<h2>The Steady Growth of Supply Chain Threats<\/h2>\n<p>According to Gartner predictions, nearly half (<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-03-07-gartner-identifies-top-security-and-risk-management-trends-for-2022\" target=\"_blank\" rel=\"noopener\">45%<\/a>) of the world will have experienced an attack on their software supply chain by 2025. This is three times the number affected in 2021.<\/p>\n<p>Several factors account for the increase. Digital supply chain attacks give attackers a high ROI. Think of all the \u201cfree\u201d damage done by Log4j; <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-nearly-half-of-corporate-networks-have-been-targeted-by-attackers-trying-to-use-this-vulnerability\/\" target=\"_blank\" rel=\"noopener\">40%<\/a> of global networks were jeopardized from a single CVE. Additionally, hyper-distributed environments, remote work, and cloud migration have forced digital supply chains to become longer, more far-flung, and even more intricately connected. This adds to the \u201cmore bang for your buck\u201d appeal, along with force-multiplying attack vectors, places to hide, and statistical chances for error.<\/p>\n<p>With this in mind, cybercriminals are unleashing more venom into the digital supply chain than ever before, particularly in open-source ecosystems. One industry report notes that the number of malicious packets uploaded to public component registries has <a href=\"https:\/\/www.csoonline.com\/article\/654560\/why-open-source-software-supply-chain-attacks-have-tripled-in-a-year.html\" target=\"_blank\" rel=\"noopener\">tripled<\/a> in the past year. According to the <a href=\"https:\/\/www.sonatype.com\/state-of-the-software-supply-chain\/introduction\" target=\"_blank\" rel=\"noopener\">same report<\/a>, \u201cThis pace of growth is astonishing. It signals the role of the supply chain as one of the fastest-growing vectors for adversaries to execute malicious code. Furthermore, we have seen an increase in nation-state actors leveraging these vectors.\u201d<\/p>\n<p>That meteoric rise in third-party incidents has prompted a harder look at the security levers that could secure the supply chain, particularly SBOMs.<\/p>\n<h2>SBOMs: Defending from the Inside Out<\/h2>\n<p>While SBOMS are mandatory for any agency selling software to the federal government, they are a growing best practice that is becoming less of a \u201chave to\u201d and more of a \u201cwant to\u201d. With the expansion of digital supply chains, SBOMs have now become an integral part of <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">attack surface management<\/a>.<\/p>\n<p>Russell Jones, a partner with Deloitte &amp; Touche LLP, U.S. Cyber and Strategic Risk Practice, explained why in an article in <a href=\"https:\/\/www.wired.com\/sponsored\/story\/dropping-an-sbom-on-your-software-supply-chain\/\">WIRED<\/a>. Describing the problem, he states, \u201cTo understand the cyber risk present in software products throughout the supply chain, an organization needs visibility into the components that make up the software product. If a malware or ransomware attack occurs in an Internet of Things (IoT) device or commercial off-the-shelf (COTS) product, companies have a complex web of software vendors to investigate and identify vulnerabilities among a multitude of open source and third-party software components.\u201d To counter that blinding web of software-origin complexity, \u201cSBOMs are like \u2018ingredient\u2019 lists that can help security analysts (and adversaries just the same) more easily identify potentially impacted\/vulnerable components\u201d among so many.<\/p>\n<h2>SBOMs and Critical Infrastructure<\/h2>\n<p>Critical infrastructure sectors particularly stand to benefit from this degree of build-level transparency.<\/p>\n<p>Healthcare has been leading the charge to standardize and utilize SBOMs to their fullest, resulting in <a href=\"https:\/\/dojofive.com\/blog\/software-bill-of-material-sbom-for-medical-devices\/\" target=\"_blank\" rel=\"noopener\">safer IoT medical devices<\/a> in the field. Now, device manufacturers are creating machine-readable SBOMs that provide useful information for vulnerability management and incident response to hospital-based I.T. teams.<\/p>\n<p>Other sectors have just as much need for SBOMs, if not more. As much as <a href=\"https:\/\/www.powermag.com\/report-power-sector-supply-chain-dependent-on-adversaries\/\" target=\"_blank\" rel=\"noopener\">90%<\/a> of products used by U.S. electric utilities contain components from China or Russia, which were three times more likely to contain critical vulnerabilities. Disconcertingly, <a href=\"https:\/\/www.darkreading.com\/application-security\/fortress-information-security-codesecure-team-up-to-analyze-sboms-remediate-critical-vulnerabilities\" target=\"_blank\" rel=\"noopener\">Dark Reading<\/a> reports that new research reveals that those vulnerabilities can \u201clie in wait\u201d for up to three years. Not a comforting thought.<\/p>\n<p>That\u2019s why critical infrastructure needs to start making the transition. Admittedly, there is much legacy architecture within the <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/securing-ot-ics-safeguarding-critical-operations\/\" target=\"_blank\" rel=\"noopener\">O.T. of current CNI sectors<\/a>. However, as <a href=\"https:\/\/www.cybersecuritydive.com\/news\/software-bill-of-materials-sbom-biden-executive-order-supply-chain\/606846\/\" target=\"_blank\" rel=\"noopener\">Sounil Yu<\/a>, CISO of JupiterOne, says, \u201cLegacy software without an SBOM is like a can of food from the 1920s without an ingredient label. Consume at your own risk.\u201d<\/p>\n<p>That\u2019s why new legislation makes SBOMs a must for government agencies. The U.S. Army is already considering proactive ways of using them to <a href=\"https:\/\/www.meritalk.com\/articles\/army-seeks-input-on-sboms-for-software-supply-chain-security\/\" target=\"_blank\" rel=\"noopener\">shore up their vast supply chain<\/a>, stating in their recent RFI that SBOMs would \u201cprovide increased fidelity into the Army software supply chain to query components on-demand and target mitigations for high-risk software components\u201d as well as \u201cenhance the security of the Army\u2019s software supply chain and enable proactive risk mitigation.\u201d<\/p>\n<p>Moving forward, the future is bright as third-party risk reduction increasingly becomes the rule, not the exception. Early adopters will find the doors to government contracts open to them, perhaps finding fewer compliant competitors than before.<\/p>\n<p>Itegriti\u2019s expertise lies in securing some of the nation\u2019s <a href=\"https:\/\/itegriti.com\/kw022024\/expertise\/\" target=\"_blank\" rel=\"noopener\">largest critical infrastructure sectors<\/a> and can help you (and your supply chain) stay compliant with current government regulations. Our Product Security Platform generates SBOMs in multiple formats to expose lurking visibilities in your software supply chain and clamp down on burgeoning third-party threats.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit. Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us: <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a href=\"https:\/\/itegriti.com\/kw022024\/\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":53,"featured_media":4884,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193,2192,2208,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using SBOMs to Reduce Third-Party Risks - kw022024<\/title>\n<meta name=\"description\" content=\"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using SBOMs to Reduce Third-Party Risks\" \/>\n<meta property=\"og:description\" content=\"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-09T14:46:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T14:58:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"Using SBOMs to Reduce Third-Party Risks\",\"datePublished\":\"2024-01-09T14:46:24+00:00\",\"dateModified\":\"2024-01-09T14:58:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\"},\"wordCount\":1920,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Healthcare Sector\",\"Water Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\",\"name\":\"Using SBOMs to Reduce Third-Party Risks - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png\",\"datePublished\":\"2024-01-09T14:46:24+00:00\",\"dateModified\":\"2024-01-09T14:58:13+00:00\",\"description\":\"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using SBOMs to Reduce Third-Party Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using SBOMs to Reduce Third-Party Risks - kw022024","description":"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/","og_locale":"en_US","og_type":"article","og_title":"Using SBOMs to Reduce Third-Party Risks","og_description":"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.","og_url":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2024-01-09T14:46:24+00:00","article_modified_time":"2024-01-09T14:58:13+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png","type":"image\/png"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"Using SBOMs to Reduce Third-Party Risks","datePublished":"2024-01-09T14:46:24+00:00","dateModified":"2024-01-09T14:58:13+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/"},"wordCount":1920,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png","keywords":["Cybersecurity","Energy Sector","Finance Sector","Healthcare Sector","Water Sector"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/","url":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/","name":"Using SBOMs to Reduce Third-Party Risks - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png","datePublished":"2024-01-09T14:46:24+00:00","dateModified":"2024-01-09T14:58:13+00:00","description":"As digital software supply chains explode, a wave of new third-party risks is introduced into some of the most sensitive ecosystems, including government and critical infrastructure.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/176.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2024\/compliance\/using-sboms-to-reduce-third-party-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Using SBOMs to Reduce Third-Party Risks"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4883"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4883"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4883\/revisions"}],"predecessor-version":[{"id":4887,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4883\/revisions\/4887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4884"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}