Join 4,000+ technologists, decision makers and community members in Raleigh, NC

October 13 - 15

Register

Security

Securing the Development Supply Chain

Wes Widner   

Engineers are regularly targeted by adversaries. And increasingly its not the engineer the adversary is interested in but the software the engineer is working on. The most common avenue of attack is 3rd party libraries that most engineers use to aid development. Join me in this session as we discuss the ways 3rd party libraries go bad, how to identify a compromised library, and ways to safely incorporate 3rd party libraries into your development workflow.