Acquisition Oversight for Software Assurance
• Presentation
In this webcast, Dr. Carol Woody and Michael Bandor discuss key software assurance activities that must be embedded within the acquisition lifecycle to be effective.
Publisher
Software Engineering Institute
Topic or Tag
Abstract
Software management is too frequently ignored or addressed piecemeal in systems. Cyber threat actors take advantage of gaps and errors in their attacks, which they can accomplish throughout the lifecycle. Exploiting these gaps and errors allows them to compromise processes, practices, and procedures that touch a system’s design, component development, and supply chain to bypass controls and leverage available vulnerabilities. Key software assurance activities must be embedded within the acquisition lifecycle to effectively combat these threat actors.
What Will Attendees Learn?
- How software assurance can be addressed with limited cost and schedule impact if it is effectively integrated into the acquisition lifecycle
- Which knowledge and resources are critical to software assurance and the risks that can be missed if they are underrepresented
- Key aspects of managing acquisition and development that are critical to software assurance and why they are important