DevOps

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Written By
Beyond Identity Blog
Published On
Nov 5, 2021

Software supply chain attacks are on the rise, and organizations need to do more to understand and correct development and build process vulnerabilities. Following the SolarWinds and Kaseya attacks, cyber experts have identified some of the broader software supply chain vulnerabilities that impact most organizations. Hackers have been able to build complex code bases and automated build processes with modern, agile development methods, making way for a multitude of new ways to exploit systems.

Watch our webinar above as Deb Radcliff, a strategic analyst with the CRA’s custom research program and two-time Neal Award winner for investigative reporting, along with Beyond Identity’s Husnain Bajwa, Senior Manager of Global Sales Engineering, and Colton Chojnacki, Product Manager, discuss the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Key topics include:

  • The vulnerabilities in modern SDLC processes
  • How a zero-trust philosophy can be applied to this problem
  • A way to shift left and implement a process for ensuring code provenance
Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Download

Software supply chain attacks are on the rise, and organizations need to do more to understand and correct development and build process vulnerabilities. Following the SolarWinds and Kaseya attacks, cyber experts have identified some of the broader software supply chain vulnerabilities that impact most organizations. Hackers have been able to build complex code bases and automated build processes with modern, agile development methods, making way for a multitude of new ways to exploit systems.

Watch our webinar above as Deb Radcliff, a strategic analyst with the CRA’s custom research program and two-time Neal Award winner for investigative reporting, along with Beyond Identity’s Husnain Bajwa, Senior Manager of Global Sales Engineering, and Colton Chojnacki, Product Manager, discuss the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Key topics include:

  • The vulnerabilities in modern SDLC processes
  • How a zero-trust philosophy can be applied to this problem
  • A way to shift left and implement a process for ensuring code provenance

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Software supply chain attacks are on the rise, and organizations need to do more to understand and correct development and build process vulnerabilities. Following the SolarWinds and Kaseya attacks, cyber experts have identified some of the broader software supply chain vulnerabilities that impact most organizations. Hackers have been able to build complex code bases and automated build processes with modern, agile development methods, making way for a multitude of new ways to exploit systems.

Watch our webinar above as Deb Radcliff, a strategic analyst with the CRA’s custom research program and two-time Neal Award winner for investigative reporting, along with Beyond Identity’s Husnain Bajwa, Senior Manager of Global Sales Engineering, and Colton Chojnacki, Product Manager, discuss the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Key topics include:

  • The vulnerabilities in modern SDLC processes
  • How a zero-trust philosophy can be applied to this problem
  • A way to shift left and implement a process for ensuring code provenance

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Software supply chain attacks are on the rise, and organizations need to do more to understand and correct development and build process vulnerabilities. Following the SolarWinds and Kaseya attacks, cyber experts have identified some of the broader software supply chain vulnerabilities that impact most organizations. Hackers have been able to build complex code bases and automated build processes with modern, agile development methods, making way for a multitude of new ways to exploit systems.

Watch our webinar above as Deb Radcliff, a strategic analyst with the CRA’s custom research program and two-time Neal Award winner for investigative reporting, along with Beyond Identity’s Husnain Bajwa, Senior Manager of Global Sales Engineering, and Colton Chojnacki, Product Manager, discuss the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Key topics include:

  • The vulnerabilities in modern SDLC processes
  • How a zero-trust philosophy can be applied to this problem
  • A way to shift left and implement a process for ensuring code provenance
Book

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.