James Robinson Deputy CISO/Dir Netskope;Liav Caspi CTO Legit Sec;Alex Babar Product Marktg Dir Legit Sec; Dunlap, Moderator
The pace of new software releases has grown rapidly since the shift to DevOps, which in turn has created a dynamic attack surface in need of immediate protection: the development environments in your software supply chain. Attackers are compromising your source code management systems, build servers, and artifact registries in your CI/CD pipelines. As seen in the recent LastPass security incident, a compromise of one development system led to business interruption and the exfiltration of LastPass’s source code and proprietary data.
Join Legit Security and (ISC)² October 20, 2022 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we discuss techniques you can use to effectively harden your developer environments.
In this webinar you will also learn:
• How to prevent your business from falling victim to the type of attack that recently compromised LastPass
• Methods for security practitioners to secure decentralized developer environments at scale
• Best practices to reduce the likelihood of lateral movement in the event of a compromised developer environment