BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20210314T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20211107T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20210325T025935Z
UID:19616281-89FB-4F6D-8FF5-32C7A5562554
DTSTART;TZID=US/Eastern:20210323T170000
DTEND;TZID=US/Eastern:20210323T183000
DESCRIPTION:Systems are built out of components that are integrated from th
 e lowest level of a supply chain up to a finished product. This creates a 
 serious weakness in that malicious code\, or counterfeit parts can be inse
 rted at the bottom of the process without scrutiny and then integrated up 
 into the end-product\, as was demonstrated by the recent SolarWinds hack.\
 n\nThe possibility of such a thing occurring is so obvious that you would 
 think that there have been practical efforts to address it. However\, even
  though we’ve expended much time and effort to ensure robust\, efficient
  and defect free code\, we have done very little to ensure against comprom
 ises that could occur during the integration process. Thus\, the aim of th
 is talk will be to outline the challenge of supply chain risk\, as well as
  present a couple of potential solutions.\n\nCo-sponsored by: Subramaniam 
 Ganesan\n\nSpeaker(s): Dan Shoemaker\, \n\nAgenda: \n5:00 PM (sharp) Webin
 ar starts\n\n6:15 PM - Q&amp;A\n\n6:30 PM - Webinar ends\n\nRoom: Virtual\, Bl
 dg: Digital\, Cyber City\, Michigan\, United States\, 48309-4479\, Virtual
 : https://events.vtools.ieee.org/m/265634
LOCATION:Room: Virtual\, Bldg: Digital\, Cyber City\, Michigan\, United Sta
 tes\, 48309-4479\, Virtual: https://events.vtools.ieee.org/m/265634
ORGANIZER:sharan.kalwani@ieee.org
SEQUENCE:6
SUMMARY:Secure Sourcing of COTS Products
URL;VALUE=URI:https://events.vtools.ieee.org/m/265634
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Systems are built out of components that a
 re integrated from the lowest level of a supply chain up to a finished pro
 duct.&amp;nbsp\; This creates a serious weakness in that malicious code\, or c
 ounterfeit parts can be inserted at the bottom of the process without scru
 tiny and then integrated up into the end-product\, as was demonstrated by 
 the recent SolarWinds hack.&lt;/p&gt;\n&lt;p&gt;The possibility of such a thing occurr
 ing is so obvious that you would think that there have been practical effo
 rts to address it. However\, even though we&amp;rsquo\;ve expended much time a
 nd effort to ensure robust\, efficient and defect free code\, we have done
  very little to ensure against compromises that could occur during the int
 egration process. Thus\, the aim of this talk will be to outline the chall
 enge of supply chain risk\, as well as present a couple of potential solut
 ions.&amp;nbsp\;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;5:00 PM (sharp) Webinar start
 s&lt;/p&gt;\n&lt;p&gt;6:15 PM - Q&amp;amp\;A&lt;/p&gt;\n&lt;p&gt;6:30 PM - Webinar ends&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\
 ;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

