InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Beyond SBOMs: Runtime Verification for Bulletproof Cloud Supply Chains

Presented by

Dr. Constanze Roedig, Key Researcher & Founder | SBA-Research & Fusioncore.ai

About this talk

As cloud supply chain attacks escalate in sophistication, traditional SBOMs alone prove insufficient for comprehensive security. While SBOMs provide valuable component inventories, they lack runtime verification capabilities—creating a critical blind spot that malicious actors increasingly exploit. This gap between static analysis and runtime behavior represents one of the most significant vulnerabilities in modern cloud environments. The "Bill of Behavior" (BoB) approach addresses this challenge by providing vendor-supplied profiles of expected runtime behaviors. Generated using eBPF technology, BoBs codify legitimate syscalls, file access patterns and network communications. This enables immediate anomaly detection without custom rule creation, allowing organizations to verify software integrity throughout the supply chain and during execution, dramatically reducing the attack surface while simplifying security operations. Join Dr. Constanze Roedig, Key Researcher at SBA-Research and Founder of Fusioncore.ai, to discover how this emerging standard complements existing SBOM frameworks to create verifiable trust in your cloud ecosystem. Key Takeaways: - Understand how Software Bills of Behavior (SBoBs) create verifiable trust between vendors and clients - Learn practical implementation strategies using existing OCI distribution standards - Discover how BoBs significantly reduce attack surfaces across both runtime and supply chain vectors - Explore immediate benefits of receiving vendor-supplied behavior profiles with software packages - Discover how CNCF Kubescape allows anomaly detection out of the box
Information Security

Information Security

259118 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics