Secure Sourcing of COTS Software

Virtual

Systems are built by integrating components upwards from the lowest level of the supply chain to the finished, often highly complex, product. That upward integration process represents a potential security weakness.

Hawaii FoundHer Information Session

Virtual

We are looking for our next cohort of Native Hawaiian, Asian American, and Pacific Islander women entrepreneurs committed to an abundance mindset and equity.

Free