Keeping the Pace: Innovation Insights - The Blast Radius Problem
Join Michael Scott, Colin Lernihan, and Ishan Sethi for a LinkedIn Live on how to assess the true blast radius of software supply chain risk. When a dependency, repository, or contributor becomes risky, the first question isn’t just what’s affected, it’s where else that risk exists.
LinkedIn Live Webinar
Keeping the Pace: Innovation Insights - The Blast Radius Problem
April 9, 2026 • 1:15pm-1:45pm EST
Join Michael Scott, Colin Lernihan, and Ishan Sethi for a LinkedIn Live on how to assess the true blast radius of software supply chain risk.
Register Now
When a dependency, repository, or contributor becomes risky, the first question isn’t just what’s affected, it’s where else that risk exists.
In this session, they’ll show how NetRise Provenance helps teams map dependency and reverse-dependency relationships, understand how risk propagates across products and vendors, and determine blast radius in minutes instead of days. Learn how to move from identifying vulnerable components to scoping real impact so you can prioritize response, reduce uncertainty, and make faster, more defensible decisions.
What You Will Learn
You can’t prioritize what you can’t trace
Why SBOMs and SCA alone don’t show who’s behind your software or how risk spreads, and what context is missing to understand real exposure across products and vendors.
Blast radius clarity cuts the noise
How to map dependencies and reverse-dependencies to see how risk propagates—and quickly identify affected components, products, and vendors.
Enforce trust with policy
How to turn provenance and dependency context into policies that flag or block higher-risk components and standardize response across teams.
Stay up to date with the news
Sign up to get our free insights delivered to your inbox.
You might also like
Learn how we helped the customers to reach the next level
Webinar
Keeping the Pace: Innovation Insights - Vulnerability Prioritization
Webinar
Fragile by Design: Large-Scale Evidence of Software Supply Chain Risk
Webinar
The Dependency Mirage: Hidden Vulnerabilities in Compiled Binaries