Vandana Verma
Walking into the era of Supply Chain Risks
#1about 4 minutes
Developers as an unintentional malware distribution vehicle
Recent incidents like the event-stream package compromise show how attackers can turn developers into a distribution channel for malware.
#2about 4 minutes
The hidden risks of open-source dependencies
Vulnerabilities in common dependencies, like Apache Struts which led to the Equifax breach, highlight the danger of unmanaged open-source code.
#3about 4 minutes
Defining the modern software supply chain
The software supply chain mirrors a manufacturing process, and attackers exploit its weakest links to create cascading failures.
#4about 4 minutes
Common attack vectors and the zero trust principle
Attacks like dependency confusion and prototype pollution, exemplified by the SolarWinds incident, necessitate a zero trust security model.
#5about 4 minutes
Building a foundation for pipeline security
Secure your development pipeline by using frameworks from OpenSSF, implementing SBOMs, and securing code, containers, and secrets.
#6about 4 minutes
Demo: Bypassing sanitization with prototype pollution
A practical demonstration shows how prototype pollution can bypass input validation in a Node.js application by passing an array instead of a string.
#7about 3 minutes
Demo: Exploiting the Log4Shell vulnerability
This live hacking demo shows how the Log4j (Log4Shell) vulnerability allows an attacker to achieve remote code execution on a vulnerable server.
#8about 2 minutes
Demo: Remote code execution via a Python dependency
A vulnerable version of the Python Celery library is exploited to achieve remote code execution and exfiltrate server information.
#9about 1 minute
Fostering a developer-first security culture
The key to better security is creating a developer-friendly environment and engaging with communities like OWASP to stay informed.
#10about 8 minutes
Q&A: Career advice for aspiring security professionals
The speaker shares her career journey, tips for students entering cybersecurity, and thoughts on social engineering and learning resources.
Related jobs
Jobs that call for the skills explored in this talk.
Featured Partners
Related Videos
Stranger Danger: Your Java Attack Surface Just Got Bigger
Vandana Verma Sehgal
The attacker's footprint
Antonio de Mello & Amine Abed
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
You can’t hack what you can’t see
Reto Kaeser
How to Cause (or Prevent) a Massive Data Breach- Secure Coding and IDOR
Anna Bacher
DevSecOps: Security in DevOps
Aarno Aukia
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
From learning to earning
Jobs that call for the skills explored in this talk.
Software Engineer - Continuous Delivery - Java
Wise
Charing Cross, United Kingdom
Remote
€83K
Java
Docker
Grafana
+7
Full Stack Software Engineer (Attack Surface Management)
Sysdig
Remote
Intermediate
REST
MySQL
Neo4j
PostgreSQL
+4
Development Security Operations (DevSecOps) Engineer
pawaTech
Municipality of Madrid, Spain
GIT
Linux
Kubernetes
Continuous Integration
DevOps Security Engineer with Golang Development Focus (m/f/d)
SAP AG
Sankt Leon-Rot, Germany
Junior
Go
Azure
DevOps
Puppet
Docker
+6


