Practical DevSecOps - Hands-on DevSecOps Certification and Training.

Securing the Weakest Links: Preventing Supply Chain Attacks Before They Spiral

29 July, 2025

60 min

Securing the Weakest Links: Preventing Supply Chain Attacks Before They Spiral

Your software supply chain is only as secure as its weakest link — and attackers know exactly where to strike.

From leaked secrets to poisoned packages and sneaky pull requests, today’s supply chain attacks are stealthy, fast-moving, and devastating. Organizations worldwide are being targeted, and traditional AppSec strategies simply aren’t enough anymore.

🔒 Why This Matters
Cybercriminals are exploiting every gap in the CI/CD pipeline — from unmonitored open-source dependencies to poisoned builds — and the cost of a single compromise can be catastrophic. If you’re responsible for securing code, infrastructure, or production environments, this session is for you.

📚 What will you learn in this webinar?
✅ Preventing and responding to secret leaks before attackers weaponize them
✅ Detecting and blocking malicious pull requests inside your CI/CD pipeline
✅ Vetting and monitoring open-source components for hidden backdoors and threats
✅ Automating and enforcing secure-by-default supply chain practices at scale
🎯 Who Should Attend
✅ Security Engineers & Application Security Teams
✅ DevOps & Platform Engineers
✅ IT Security Leaders & Product Security Professionals
✅ Anyone looking to strengthen their CI/CD pipeline security

About Speaker

Webinar Speaker Profile Pic

Luis Rodriguez

Co-Founder and CTO @ Xygeni Security

Recent DevSecOps Live

How To Learn Policy as Code Without Losing Your Mind

How To Learn Policy as Code Without Losing Your Mind

If you wanted to explore Policy as Code, and better...

28 June, 2022

60 min

To DevSecOps or not to DevSecOps: is that a question?

To DevSecOps or not to DevSecOps: is that a question?

The term DevSecOps divides even the security industry itself. The...

21 May, 2020

60 min

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN - Kim Wuyts 📚 What...

28 April, 2022

60 min