Software security and compliance webinars
News|17 May 2018
June to July 2018
Together with open source risk management specialists, Source Code Control, we are hosting a series of webinars focusing on the importance of developing a robust policy surrounding the use of open source and third-party components and software within your business.
With the coming of GDPR the focus has fallen on not just the compliance of data processes and security for your endpoints, but also the security and compliance of the software that you develop, buy, and use.
Each webinar will cover the importance of removing risk from free and open source software for: software developers and those investing in software and public sector organisations.
Webinar: software security for investors and developers. Tuesday 12 June, 2:30pm BST
Webinar: open source security for the public sector. Wednesday 4 July, 2:30pm BST
Every modern business uses software in some shape or form, whether it’s your point-of-sale device, the applications you use to manage everyday tasks on your digital device in the office, or the software that keeps your production line in the factory running smoothly. Non-compliant licences and vulnerabilities caused by unchecked third-party or open source code in software can have serious consequences for any organisation and business.
Sign up for one of our webinars and find out how to reduce your business risk!
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Related News
Cyber security in 2025: What you need to know from the NCSC Annual Review
The National Cyber Security Centre (NCSC) has published its 2025 Annual Review – and it’s a wake-up call. From ransomware surges to AI-powered threats, the cyber landscape is shifting fast. Here’s what you need to know to stay ahead. 1....
Understanding the mission critical assets layer of cyber security
Cyber threats don’t knock. They barge in. That’s why forming a multi-layered fortress is important – each layer a wall, gate, or watchtower designed to keep intruders at bay. At the very centre of this fortress lies your mission critical assets...
Control access with the perimeter security layer
In part two of our seven layers of security miniseries, our Cyber Security Specialist Scott Harrison shares tips and insights on how to make your organisation’s digital perimeter safe from threats. It’s all about ensuring only the right people get...
The human layer in cyber security: Create a human firewall
Cyber threats are everywhere. They’re more sophisticated. Hacking is even run as a business. So any organisation, no matter the size is vulnerable. And regulations are getting stricter. Grey Matter Talks Tech season three is here As it’s such a...