Mastering Software Supply Chain Security with Strategic Defense Mechanisms

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In delivering modern software, vulnerabilities lurk around every corner, and safeguarding the software supply chain is paramount.

Software supply chain cyber-attacks have been rising in recent years, making headlines with high-profile incidents. These attacks can have devastating consequences for organizations, leading to data breaches, ransomware attacks, and other disruptions.

One reason for the rise in software supply chain attacks is that they are a highly effective way for attackers to gain access to multiple organizations at once. By compromising a single software vendor or open source project, attackers can gain access to all of the vendor's customers or users.

Join us in this knowledge-packed webinar where we will discuss implementing a robust security approach, ensuring that your code, configurations, and binaries are secure and resilient against malicious threats.

Attend our webinar to learn:

  • Holistic Security Strategies: Discover comprehensive actions to bolster security across code, configurations, and binaries, ensuring a fortified defense against supply chain risks.
  • Operational Risk Management: Gain insights into managing operational risks such as package maintenance issues and technical debt, enabling a smooth and secure development process.
  • Protection Against Malicious Activities: Learn how to identify and mitigate security issues that emerge post-code generation and keep malicious packages at bay to maintain the integrity of the development process.
  • Accelerated Remediation Techniques: Equip yourself with practical knowledge on prioritizing and swiftly addressing vulnerabilities, leveraging enhanced CVE data and developer-friendly, step-by-step fixes to ensure rapid and effective remediation.


Photo of Lakshmi Balasubramaniam

Lakshmi Balasubramaniam

Security Operations Executive, IBM Corporation

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for JFrog here: Please see Infosecurity Magazine’s privacy policy for more information.