Watch the full video.

Thwart Supply Chain Attacks by Securing Development

Thwart Supply Chain Attacks by Securing Development / Build Vulnerabilities Webinar Recap

Beyond Identity Blog | Friday, November 5, 2021

Software supply chain attacks are on the rise, and organizations need to do more to understand and correct development and build process vulnerabilities. Following the SolarWinds and Kaseya attacks, cyber experts have identified some of the broader software supply chain vulnerabilities that impact most organizations. Hackers have been able to build complex code bases and automated build processes with modern, agile development methods, making way for a multitude of new ways to exploit systems.

Watch our webinar above as Deb Radcliff, a strategic analyst with the CRA’s custom research program and two-time Neal Award winner for investigative reporting, along with Beyond Identity’s Husnain Bajwa, Senior Manager of Global Sales Engineering, and Colton Chojnacki, Product Manager, discuss the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Key topics include:

  • The vulnerabilities in modern SDLC processes
  • How a zero-trust philosophy can be applied to this problem
  • A way to shift left and implement a process for ensuring code provenance