<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">


Think About Your Audience Before Choosing a Webinar Title

Sponsored by:Mend-Blue


On Demand

Software supply chain threats and increasing regulatory pressures make supply chain security a top priority for software organizations. While building secure applications is a must for any organization, the path to creating secure software is anything but clear. Software bills of materials (SBOMs) have emerged as an essential tool and a roadmap for organizations on their secure software journey.

While most of today’s SBOM efforts revolve around tracking software components, versions and licenses, as SBOM technologies and regulations evolve, organizations should be ready to capitalize on new SBOM-related opportunities. Organizations should start building strategies to leverage SBOM data through a process that identifies applications, creates SBOMs and makes them available for the business to deliver repeatable and ongoing value.

Join our panel of software security experts as we discuss:

  • How to create a sustainable software supply chain security strategy
  • How to identify processes and tools for creating SBOMs
  • Automating SBOM creation as part of DevOps and application security workflows
  • Keeping up with the latest advances in SBOMs, application and software supply chain security.
Daniel Bardenstein
CTO and Co-founder - Manifest
Daniel Bardenstein is the CTO and co-founder of Manifest, a venture-backed software supply chain company allowing enterprises with end-to-end SBOM management. With Manifest, organizations can easily automate the entire lifecycle of an SBOM, from generation, aggregation, enrichment, analysis, reporting, and sharing. Prior to founding Manifest, Daniel served as the Chief of Tech Strategy at CISA, where he drove technology modernization and OT/ICS strategy across the agency, and led the development of the Cybersecurity Performance Goals. At the Defense Digital Service, he led cybersecurity programs across the Department of Defense, including securing the COVID-19 vaccines and the Hack the Pentagon program. Before joining government. Daniel was also a Tech Policy Fellow at the Aspen Institute, and is the co-President Foresight Partners, a non-profit that provides free cybersecurity support to political campaigns. He holds several security certifications as well as a patent. 
Jeffrey Martin
Vice President, Product Management - Mend
Jeff has spent over 15 years in Product roles helping both the organizations he worked for and their customers transform and measure their business processes, Development, and QA. He especially enjoys cultural and mindset transformations for their ability to create lasting progress.
Dmitry Raidman
CTO - Cybeats
Dmitry is a Canadian-Israeli entrepreneur and cybersecurity professional who has been around the technology ecosystem for over two decades. Dmitry’s specialty is in the area of application security, cloud architecture, DevOps, DevSecOps, and automation of cyber-defense mechanisms. Dmitry co-founded Cybeats in 2016. In late 2018 Dmitry joined the NTIA group that worked to shape the SBOM standard. In 2020 Dmitry invented the SBOM Studio solution to help Enterprises consume and manage SBOMs. To give back to the cybersecurity community, Dmitry co-founded the Security Architecture Podcast during the COVID-19 pandemic in 2020. Today Dmitry is leading the innovation, technology, and product in Cybeats as CTO and participates in various working groups to define the future of SBOM, VEX, CSAF.
Dr. Lisa Bradley
Senior Director of Product & Application Security - Dell Technologies
Dr. Lisa Bradley is the Senior Director of Product & Application Security at Dell Technologies focusing on Vulnerability Response, Customer Security and Community Enablement. In this role, she oversees Dell's Product Security Incident Response Team (PSIRT), Bug Bounty Program, SBOM, and third-party Dependency Management. She also oversees Dell’s Security Champion Program, Security Training Program, and the Customer Security team where she strives to meet Dell’s customer security needs and build customer trust into the core of product and application security practices.
Mitch Ashley
CTO, Techstrong Group Principal - Techstrong Research
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services. Mitch serves as Principal of Techstrong Research where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.