Engineers are regularly targeted by adversaries. And increasingly its not the engineer the adversary is interested in but the software the engineer is working on. The most common avenue of attack is 3rd party libraries that most engineers use to aid development. Join me in this session as we discuss the ways 3rd party libraries go bad, how to identify a compromised library, and ways to safely incorporate 3rd party libraries into your development workflow.