WEBINAR

NOW ON DEMAND

About the Hosts

Jeremy Valance
Research Engineer, Office of the CTO
James Petersen
DevSecOps Engineer

 

Jeremy has a diverse background in a wide variety of technologies across the cloud-native ecosystem.  His recent focus is on container and Kubernetes security within the SDLC. Jeremy is based in Boston and most weekends you can find him running or hiking outdoors.

James works at Platform One as an SRE and system designer for the Iron Bank environment. James lives in Colorado Springs and in his spare time enjoys snowboarding and perfecting his smoked meat recipes.

I’m not an Anchore customer. Can I join?

You sure can. The webinar is complimentary for existing customers and anyone interested.

What if I register but can't make it?

Not a problem. You can always register for our other webinars at a more convenient time.

Will the webinar be recorded?

The webinar will be recorded and available on demand for anyone to watch who was unable to attend.

Can I ask questions?

Absolutely! This webinar is for you. Bring your questions and participate during the  Q&A.

00 day 00 hrs 00 mins 00 secs

GET THE RECORDING

Software applications today include components from many sources, including open source, commercial components, and proprietary code. As software supply chain attacks have increased over the past several years, organizations must embed continuous security and compliance checks in every step of their software development process, from sourcing to CI/CD pipelines to production.

•  Understanding possible attack points in  the software supply chain

  • How containers fit in the software supply chain

  • Best practices for securing containers at every stage of the process

  • How the U.S. Department of Defense is innovating to better secure containers in their software supply chain

In this webinar, you will learn how to secure your software supply chain for applications delivered in containers, including:

COUNTDOWN TO REGISTER

Questions & Answers

HOW TO SECURE CONTAINERS FROM SOFTWARE SUPPLY CHAIN ATTACKS