Abstract
Modern enterprises are only as secure as their weakest link in the digital supply chain: a compromised SaaS provider, a vulnerable open-source library, a misconfigured cloud partner or a third-party contractor with excessive access. In 2026, attackers are no longer targeting the enterprise directly; they are weaponizing dependencies, exploiting trust relationships and moving laterally through the ecosystem.
For CISOs, this means security can no longer stop at the firewall; it must extend into the health, posture and behavior of every connected vendor, platform and component. This session will cover: Building a layered defense for the extended ecosystem; Mapping and prioritizing digital dependencies; The new attack surface: Why supply chain is the primary battleground.