Thwart supply chain attacks by securing development / build vulnerabilities

Given the spate of software supply chain attacks, organizations need to do more to understand and correct development and build process vulnerabilities. The recent SolarWinds and Kaseya attacks have helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact most organizations today. Modern, agile development, complex code bases and automated build processes have given attackers new ways to exploit systems.

Join our experts on a lively discussion about the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Discussion topics include:

· the vulnerabilities in modern SDLC processes;

· how a zero-trust philosophy can be applied to this problem; and

· a way to shift left and implement a process for ensuring code provenance.

Attendees of this webcast may be eligible for one CPE credit.

Husnain Bajwa Senior Manager, Global Sales Engineering Beyond Identity

Colton Chojnacki Product Manager Beyond Identity