Exploiting Vulnerabilities and Flaws to Attack Supply Chain


Posted on in Presentations

In the supply chain ecosystem there are many vulnerable platforms that are trusted by the majority of developers. These platforms can be exploited in a number of ways by attackers. In this session we will elaborate on the many attack vectors including integrated development environment (IDE), source code management (SCM), package managers and CI/CD.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Ilay Goldman

Speaker

Security Researcher, Aqua Security

Yakir Kadkoda

Speaker

Director of Security Research, Aqua Security


Share With Your Community