Events
Securing Open Source Software Supply Chains – The Next Frontier of Innovation
Open source software (OSS) is the backbone of modern innovation, accelerating development and empowering businesses to build cutting-edge applications. However, as OSS components are integrated into millions of applications, software supply chains have become an increasingly attractive target for cyber threats. Without proper security measures, vulnerabilities in these supply chains can lead to widespread breaches, compliance risks, and operational disruptions.
Join us live for a deep-dive discussion on securing open source software supply chains. This roundtable will explore the evolving threat landscape, best practices for mitigating risks, and strategies for balancing security with innovation. Attendees will gain actionable insights into safeguarding software supply chains without stifling the benefits of open source adoption.
Key Takeaways:
- Understanding the Risk: Explore the latest threats targeting open source software supply chains and the real-world impact of supply chain attacks.
- Mitigation Strategies: Learn how organizations are implementing security frameworks, automated tooling, and governance policies to fortify their software pipelines.
- Balancing Security and Innovation: Discover how to maintain OSS agility and developer efficiency while embedding security into the software development lifecycle.
Rapid Incident Response to Zero-Day Vulnerabilities with SBOMs
SBOMs are typically thought of as a developer tool to shift supply chain security left but the most popular SBOM use-case is security incident response.
Organizations face an accelerating wave of software supply chain attacks that expose critical vulnerabilities in hidden software dependencies, such as Log4j, XZ Utils, and CUPS. These high-profile zero-day disclosures become active threats and speed is crucial: organizations must immediately identify whether they are vulnerable and remediate before malicious actors can craft an exploit. The goal isn’t just to patch quickly—it’s about focusing your resources to prevent a zero-day incident from becoming a breach.
SBOMs are a critical piece for rapid incident resolution and significantly reduce the time required to assess risk exposure.
In this webinar Josh Bressers and Brian Thomason will demonstrate:
- The challenges of zero-day vulnerability security incidents
- Why an SBOM-powered inventory save hours over manual incident analysis.
- How to generate run-time/production SBOM inventory
- How to find a zero-day vulnerability in production with a single query.
How to Identify and Tackle SBOM Sprawl
Software Bill of Materials (SBOM) has emerged as a pivotal technology to scale product innovation while taming the inevitable growth of modern software development. SBOMs are typically thought of as a comprehensive inventory of all software components—both open source and proprietary—within an application. But they are more than just a simple list of “ingredients”. They offer deeper insights for organizations to unlock enterprise-wide value: From automating security and compliance audits to assessing legal risks and scaling continuous regulatory compliance.
However, as organizations begin to mature their processes, the rapid growth in SBOM documents can quickly become overwhelming. Join Alex Rybak, Director of Product Management at Anchore, and Russ Eling, Founder at OSS Consultants, as they explore multiple dimensions of SBOM sprawl, including:
- Understanding SBOM sprawl
- Strategies to reduce SBOM sprawl
- Best practices and tools to manage it
Attendees will come away with an understanding of how to recognize and avoid SBOM sprawl and controls to put in place to future-proof their practices.
Shift Right Security for EKS
Container vulnerabilities don’t stop at deployment. As your Kubernetes workloads scale across Amazon EKS clusters, maintaining continuous visibility becomes increasingly challenging, yet critically important.
Anchore’s Kubernetes Runtime Inventory delivers the real-time insights security and DevOps teams need to identify vulnerabilities, enforce policies, and maintain compliance in production environments.
Join Anchore Customer Success Engineer Ty Henry and Bion Consulting Senior DevOps Engineer Baturay Ozcan for an in-depth technical demonstration of:
– Kubernetes Runtime Inventory and why it matters for container security
– How to install and configure Anchore’s Runtime Inventory on Amazon EKS
– How Anchore Enterprise provides visibility into running containers in your EKS cluster