Securing the Weakest Links: Preventing Supply Chain Attacks Before They Spiral
Your software supply chain is only as secure as its weakest link, and attackers know exactly where to strike.
From leaked secrets to poisoned packages and sneaky pull requests, today’s supply chain attacks are stealthy, fast-moving, and devastating. Organizations worldwide are being targeted, and traditional AppSec strategies simply aren’t enough anymore.
🔒 Why This Matters
Cybercriminals are exploiting every gap in the CI/CD pipeline — from unmonitored open-source dependencies to poisoned builds — and the cost of a single compromise can be catastrophic. If you’re responsible for securing code, infrastructure, or production environments, this session is for you.
📚 What will you learn in this webinar?
✅ Preventing and responding to secret leaks before attackers weaponize them
✅ Detecting and blocking malicious pull requests inside your CI/CD pipeline
✅ Vetting and monitoring open-source components for hidden backdoors and threats
✅ Automating and enforcing secure-by-default supply chain practices at scale
🎯 Who Should Attend
✅ Security Engineers & Application Security Teams
✅ DevOps & Platform Engineers
✅ IT Security Leaders & Product Security Professionals
✅ Anyone looking to strengthen their CI/CD pipeline security
Co-Founder and CTO @ Xygeni Security