Taming the chain: A live walkthrough of secure software delivery
Attackers are targeting the software supply chain itself. Join Adrian’s live session to see how platform teams can secure CI/CD pipelines, prevent vulnerabilities, and build secure-by-default systems—without slowing down delivery. Live demo included.
In today’s fast-moving software landscape, attackers are no longer just targeting production systems — they’re exploiting the software supply chain itself. Vulnerable dependencies, misconfigured pipelines, and untrusted build artifacts have become prime targets. For platform engineers tasked with securing infrastructure and enabling fast delivery, this is both a challenge and an opportunity.
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Taming the chain: A live walkthrough of secure software delivery
Attackers are targeting the software supply chain itself. Join Adrian’s live session to see how platform teams can secure CI/CD pipelines, prevent vulnerabilities, and build secure-by-default systems—without slowing down delivery. Live demo included.
Panelist

Tom Finch
Solution Engineer, EMEA Leader, Chainguard
Panelist

Panelist

Moderator

Adrian Mouat
Global Developer Relations, Chainguard
In today’s fast-moving software landscape, attackers are no longer just targeting production systems — they’re exploiting the software supply chain itself. Vulnerable dependencies, misconfigured pipelines, and untrusted build artifacts have become prime targets. For platform engineers tasked with securing infrastructure and enabling fast delivery, this is both a challenge and an opportunity.
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Taming the chain: A live walkthrough of secure software delivery
Attackers are targeting the software supply chain itself. Join Adrian’s live session to see how platform teams can secure CI/CD pipelines, prevent vulnerabilities, and build secure-by-default systems—without slowing down delivery. Live demo included.
In today’s fast-moving software landscape, attackers are no longer just targeting production systems — they’re exploiting the software supply chain itself. Vulnerable dependencies, misconfigured pipelines, and untrusted build artifacts have become prime targets. For platform engineers tasked with securing infrastructure and enabling fast delivery, this is both a challenge and an opportunity.
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Join Adrian for a fast-paced, hands-on session that cuts through the noise and shows what modern software supply chain security looks like in action. In Taming the Chain, we’ll walk you through a live demo of a hardened CI/CD pipeline, showcasing how to bake security into every stage of software delivery — from development to deployment.
We will explore:
The anatomy of a typical software supply chain attack.
Common (and preventable) security gaps in developer workflows.
How to implement secure builds with verifiable provenance and minimal base images.
Real-world techniques for securing containers, SBOMs, and signing artifacts with Sigstore.
Tips to empower platform teams without slowing down engineering velocity.
Whether you're running Kubernetes at scale, maintaining internal developer platforms, or building high-trust environments, this session will leave you with actionable tools and a fresh perspective on what “secure by default” really means.
Live demo included. Bring your curiosity, your questions
Taming the chain: A live walkthrough of secure software delivery
Attackers are targeting the software supply chain itself. Join Adrian’s live session to see how platform teams can secure CI/CD pipelines, prevent vulnerabilities, and build secure-by-default systems—without slowing down delivery. Live demo included.
Panelist

Tom Finch
Solution Engineer, EMEA Leader, Chainguard
Panelist

Panelist

Host

Adrian Mouat
Global Developer Relations, Chainguard
Sign up now

