1、CONFIDENTIAL designatorV0000000Red Hat Trusted Software Supply Chain in Action Natale VintoLead,Red Hat Developer A natalevinto124Increased regulations,frameworks,directivesSEC Cybersecurity Rule 1 requires more governance and management regarding material cybersecurity risks,incidents.White House C
2、yber Executive Order 14028European Union Cyber Resilience ActGovernment Cybersecurity RegulationsNSA Cybersecurity Collaboration Center(CCC)National Institute of Standards and Technology(NIST)Cybersecurity and Infrastructure Security Agency(CISA)European Union Agency for Cybersecurity(ENISA)Cybersec
3、urity Agency Frameworks and Directives1 SEC Final Rule-Cybersecurity Risk Management,Strategy,Governance,and Incident Disclosure CONFIDENTIAL designatorCustomer Challenges5of enterprise technologists surveyed plan to modernize more than half of their legacy applications in the next 2 years.Source:Th
4、e Newstack80%80%Application ModernizationRise of Generative AI of Enterprises will have deployed Generative AI-Enabled Applications by 2026Source:Gartner76%of organizations say the cognitive load is so high that it is a source of low productivity.Gartner predicts 75%of companies will establish platf
5、orm teams for application delivery.Source:SalesforceSource:GartnerDeveloper ProductivityAverage annual increase in software supply chain attacks over the past three years.45%of organizations will experience attacks.Is a matter of when,not if.Source:Sonatype742%Software Supply Chain SecurityV00000006
6、The Supply Chain Security space is relatively youngRecent activities have highlighted its importanceEvolution of the DevOps movement which also includes a security component where there is increased involvement from security teams and methodologiesDevSecOps MovementRecent actions by governments acro