Who's Committing Code to your App? Lessons Learned from Real Breaches
About
Your pipelines are running at full speed—but who’s ensuring the code flowing through them is safe? The software you build is only as secure as the code that powers it. Recent incidents like the Jia Tan breach highlight how easily malicious code can slip into even the most efficient DevOps workflows.
Join our live conversation to break down real stories that reveal the many ways malicious code creeps in to your Software Supply Chain, and how to stay safe even after vulnerabilities have been exposed.
In this webinar, we’ll focus on:
How attackers exploit DevOps practices to infiltrate supply chains.
Real-world lessons from breaches like Jia Tan.
Practical steps to secure your CI/CD pipelines without slowing down delivery.
Don’t miss the chance to learn how to keep your pipelines safe without compromising speed.
See you there!
When
Wednesday, February 19, 2025 · 5:00 p.m.
Berlin (GMT +1:00)