Webinar
Secure DevOps: Key to Software Supply Chain Security

Tuesday, November 29, 2022 | 4:00pm CET, 10:00am EST, 7:00am PST
Busy that time and day? Register anyway to watch the recording

Register Now

Join this Webinar to:

  • Understand the importance of Secure DevOps.
  • Find out how to eliminate key sprawl and stolen credentials.
  • Learn how to stop code injection from non-authorised users.
  • Discover how to protect access to build environments, infrastructure, and 3rd party tooling.
  • Understand the benefits of verifiable source code provenance for auditing and forensics.
  • Get an overview of Beyond Identity’s Secure DevOps product.

How to Ensure Security at the Earliest, Most Vulnerable Stage of Software Development

In the modern world of flexible and remote working, it is useful for software engineers to be able to access and update source code from anywhere using any device, but the SolarWinds supply chain attack showed that it is essential to track every change for security and compliance reasons.

It is vital to guarantee application security at the earliest stages in the development lifecycle when source code is most vulnerable, according to Paul Fischer at KuppingerCole and Jasson Casey at Beyond Identity. Join these experts as they discuss the challenges and importance of secure DevOps.

Speakers Contribution

Paul Fisher will discuss the nature of software supply chain attacks, the importance of software supply chain security, the risks posed by software with deliberately built-in weaknesses or malware, and approaches to preventing and protecting against source code compromises.

Jasson Casey will explain how implementing controls that allow only verified corporate identities to commit source code, and tracking and signing every source code commit, stops adversaries from injecting malicious code into the CI/CD pipeline to ensure that the code is not compromised.

 
 

Jasson has served as CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity, Founder and Executive Director of Flowgrammable as well as Compiled Networks, VP of VoIP Product Development at CenturyTel, among other technical and executive roles. Jasson received a bachelor’s...

Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.