What You Need to Know About Securing Developer Environments Before It’s Too Late

Logo
Presented by

James Robinson Deputy CISO/Dir Netskope;Liav Caspi CTO Legit Sec;Alex Babar Product Marktg Dir Legit Sec; Dunlap, Moderator

About this talk

The pace of new software releases has grown rapidly since the shift to DevOps, which in turn has created a dynamic attack surface in need of immediate protection: the development environments in your software supply chain. Attackers are compromising your source code management systems, build servers, and artifact registries in your CI/CD pipelines. As seen in the recent LastPass security incident, a compromise of one development system led to business interruption and the exfiltration of LastPass’s source code and proprietary data. Join Legit Security and (ISC)² October 20, 2022 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we discuss techniques you can use to effectively harden your developer environments. In this webinar you will also learn: • How to prevent your business from falling victim to the type of attack that recently compromised LastPass • Methods for security practitioners to secure decentralized developer environments at scale • Best practices to reduce the likelihood of lateral movement in the event of a compromised developer environment
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (468)
Subscribers (156663)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.