In today's rapidly-evolving digital landscape, the application build and release processes have emerged as a critical focal point for potential security vulnerabilities. Keeping track of all the components used to build and run your applications is a critical part of maintaining a strong security posture. It is also a well-known fact that addressing vulnerabilities early on during the development or build and release process is more cost effective and reassuring.
Join Red Hat® experts for a comprehensive examination of the challenges faced by developers and businesses to explore how the Red Hat Trusted Software Supply Chain can support your DevSecOps initiatives across all phases of the application life cycle—from development, build and deploy to runtime to unlock developer productivity—and improve operational efficiency. Whether you're a developer, IT security professional, or a business leader, this session will equip you with the knowledge and tools to holistically protect your software supply chain.
In this session, Red Hat experts will discuss ways to help you better protect your end-to-end software supply chain and unlock the potential of DevSecOps through:
- Managing the risk profile of your unique software supply chain.
- Coding with integrated application security checks.
- Build with security focused continuous integration and continuous delivery (CI/CD) workflows.
- Monitoring and identifying runtime security incidents.
Speakers:
Ahilan Ponnusamy, Application Platform Specialist, Red Hat, APAC - has more than 24 years of global work experience in middleware and cloud-native technologies across Europe, the United States and APAC.
Paul Whiten, Emerging Sales Specialist - Cloud Services, Red Hat - helps customers focus on delivering better software more efficiently through the adoption of Red Hat Cloud Services application platforms.