Managing Open Source Risk: More Visibility, More Speed

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In today’s world, to survive and compete effectively, IT leaders are hiring armies of software developers, consuming massive amounts of open source and embracing DevOps to automate and optimize the entire software development lifecycle.

Do CISOs and application security professionals have visibility into the open source being used? Furthermore, what automated security processes can be initiated when a new breach is announced?

Threat actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well.

Join this webinar where a panel of experts will discuss the tactics businesses can deploy to best defend against these open source threats.

Key takeaways:

  • Analyze and detail the events leading to recent ‘all-out’ attack on the OSS industry
  • How to automatically identify open source risk and remediate known vulnerabilities
  • Empower developers to protect themselves and the millions of people depending on them

Speakers

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Paul  Horton

Paul Horton

DevOps Lead, Virgin Money

Photo of Derek Weeks

Derek Weeks

VP, Sonatype

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Sonatype here: https://www.sonatype.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.