About
Your pipelines are running at full speed—but who’s ensuring the code flowing through them is safe? The software you build is only as secure as the code that powers it. Recent incidents like the Jia Tan breach highlight how easily malicious code can slip into even the most efficient DevOps workflows.

Join our live conversation to break down real stories that reveal the many ways malicious code creeps in to your Software Supply Chain, and how to stay safe even after vulnerabilities have been exposed.

In this webinar, we’ll focus on:

How attackers exploit DevOps practices to infiltrate supply chains.
Real-world lessons from breaches like Jia Tan.
Practical steps to secure your CI/CD pipelines without slowing down delivery.
Don’t miss the chance to learn how to keep your pipelines safe without compromising speed.

See you there!
Presenter
1736359913-e55b76c5e66204c1
Yonatan Arbel
Developer Advocate - JFrog
Register To Watch Recording
First Name*
Last Name*
Email Address*
Company Name*
Company Size*
Job Title*
Phone
Postal / Zip Code*
Country*
Are you actively looking to improve your software supply chain security posture?
Yes, immediate priority
Yes, but not a top focus right now
No, our current measures are sufficient
By checking this box I agree to the above information being transferred to the United States for processing by Techstrong Group Inc., and affiliate to provide me with relevant information as described in the Techstrong Group Privacy Policy. I further agree to stay informed about future webinars, newsletters, ebooks and events relevant to my professional interests from Techstrong Group and other third parties/partners. I may unsubscribe at any time.
Yes, I consent to receiving emails*
We use BigMarker as our webinar platform. By clicking Register, you acknowledge that the information you provide will be transferred to BigMarker processing in accordance with their Terms of Service and Privacy Policy.