Tactics of adversaries to infiltrate the software supply chain have grown more sophisticated. Among them: co-opting the names of submissions in public code, with the ultimate goal being to use counterfeit code to compromise networks. How can organizations recognize pockets of risk that may exist within their own development efforts? What preventative measures can they take to ensure devops processes don’t provide avenues of access for bad actors?
Join Matt Austin, Director of Security Research, to hear details about Contrast Security’s own experience with a targeted attack against its own code: how the company responded to prevent exploitation, and best practices for secure development.
Speakers:
Matt Austin
Director of Security Research
Contrast Security
Matt is an accomplished application security expert with over 11 years of experience focused on security research, development, and engineering.
Bill Brenner
VP, Content
CyberRisk Alliance
Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for CSOonline.com and senior writer for SearchSecurity.com.
Sponsored by: