Archived: How we did it: Detection and prevention of a dependency confusion attack

On-Demand Webcast|1 hour

Tactics of adversaries to infiltrate the software supply chain have grown more sophisticated. Among them: co-opting the names of submissions in public code, with the ultimate goal being to use counterfeit code to compromise networks. How can organizations recognize pockets of risk that may exist within their own development efforts? What preventative measures can they take to ensure devops processes don’t provide avenues of access for bad actors?

Join Matt Austin, Director of Security Research, to hear details about Contrast Security’s own experience with a targeted attack against its own code: how the company responded to prevent exploitation, and best practices for secure development.

Speaker

Matt Austin

Director of Security Research

Contrast Security

Matt is an accomplished application security expert with over 11 years of experience focused on security research, development, and engineering.

Sponsored by:

Speakers

Matt Austin
Director of Security Research

Matt is an accomplished application security expert with over 11 years of experience focused on security research, development, and engineering.

Bill Brenner
VP, Content Strategy
CyberRisk Alliance

InfoSec content strategist, researcher, director, tech writer, blogger and community builder. Senior Vice President of Audience Content Strategy at CyberRisk Alliance.

Registration is closed for this event, but there are related events that you may find interesting: