Time
12:05 PM - 12:35 PM (PDT)
Name
5 Ways to Mitigate Costly Software Supply Chain Attacks to Get Your SDLC in Check
Track
Networking
Description

Developing your digital business means developing new web and mobile applications, migrating to cloud, and evolving DevSecOps practices to accelerate time to market. Yet cyberattackers have aggressively been targeting your software supply chain, including open-source repositories, to use your software as a malware distribution platform. With today’s software more reliant on third-party and open-source software, your software development lifecycle (SDLC) demands more checks to validate the integrity of your build process to ensure customers trust your releases and fulfill software assurance requirements.

In this session, we’ll discuss:

  • How to secure your supply chain with rapid analysis, authoritative file intelligence, and increased threat visibility
  • How to integrate security monitoring and application lifecycle security into your SDLC
  • How to apply tools like YARA to retroactively scan for your risks across your release history
  • How ReversingLabs analysis and tactics exposed the origins and scope of the SunBurst attack