Sponsored By:
On Demand
As far as the Cybersecurity and Infrastructure Security Agency (CISA) is concerned, there are six types of SBOMs that can be created for a single application or piece of software; none of which will be identical. While CISA doesn’t have a favorite type of SBOM, you may find that your organization, vendors or customers prefer some over others. As such, it’s important to understand what to expect from each type, how to generate them and be prepared to reconcile the differences between them.
In this Techstrong Learning Experience, experts from Synopsys will explore the six types of SBOMs, how they differ, the benefits and limitations of each and why you should choose one type over another. You'll also learn the methods and tools needed to create them and more.
Join us to learn to:
- Become familiar with the six types of SBOMs
- Understand the benefits and limitations of each type
- Know the methods and tools required to generate each type
Register Below:
After registration, we'll send you an email confirmation
Mike McGuire
Sr. Software Solutions Manager - Synopsys
Mike McGuire is a senior software solutions manager at Synopsys where he has spent several years leading go-to-market efforts for open source risk and software supply chain security solutions. After beginning his career as a software engineer, Mike transitioned into product management and strategy roles, as he enjoyed interfacing with the buyers and users of the products he worked on. Leveraging several years of development experience, Mike enjoys connecting the market’s complex AppSec problems with Synopsys’ comprehensive solutions.