

Modern CI/CD pipelines and software supply chains are critical to delivering software quickly, but they are now also prime targets for attackers. Many organizations are unaware of the many ways that their practices and security approaches may be exposing them to greater risk. In this session we’ll explore some of the vulnerabilities and common misconfigurations that have enabled attackers to compromise secured systems. Attendees will gain actionable insights and learn best practices to identify and mitigate exploits while improving their software delivery.
Join Ken Muse and Mickey Goussett as we delve into the threat landscape surrounding modern CI/CD pipelines and software supply chains. We will highlight real-world examples of attacks, dissecting how vulnerabilities were exploited and what could have been done to prevent them.
You will: