BoF: The Supply Chain is Broken: The Case of BLUEMONDAY & How To Own Everything

Posted on in Presentations

Join this interactive follow up session to listen and learn from Ken Pyle —join this session to ask questions and engage with the presenter. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Ken Pyle


Partner, Exploit Developer / Graduate Professor of Cybersecurity, CYBIR

DevSecOps & Application Security Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations

application security DevSecOps exploit of vulnerability Internet of Things unmanaged devices



Share With Your Community