Bringing Cyber Security to life with Software Configuration Management - Andrea Ferro, Manuela Mantione

Once upon a time, one week before the release meeting: "Oh, no! We need the FCA/PCA Report to pass the release checklist!"

...Today...
Let's take a closer look at how Configuration Management and Cyber Security processes are related and blossom together. For example, detecting vulnerabilities based on a sBoM or integrating specific tools and tracking the results of their execution.