How we did it: Detection and prevention of a dependency confusion attack

On-Demand Webcast|1 Hour

Tactics of adversaries to infiltrate the software supply chain have grown more sophisticated. Among them: co-opting the names of submissions in public code, with the ultimate goal being to use counterfeit code to compromise networks. How can organizations recognize pockets of risk that may exist within their own development efforts? What preventative measures can they take to ensure devops processes don’t provide avenues of access for bad actors?

Join Matt Austin, Director of Security Research, to hear details about Contrast Security’s own experience with a targeted attack against its own code: how the company responded to prevent exploitation, and best practices for secure development.

Speakers:

Speaker

Matt Austin

Director of Security Research

Contrast Security

Matt is an accomplished application security expert with over 11 years of experience focused on security research, development, and engineering.

Speaker

Bill Brenner

VP, Content

CyberRisk Alliance

Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for CSOonline.com and senior writer for SearchSecurity.com.

Sponsored by:

0%