<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Code Tampering: Four Keys to Pipeline Integrity

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by Cycode

cycode-logo-removebg-preview

 


 
On Demand
Anytime

Code tampering is a software company’s worst nightmare. Unfortunately, code tampering is leading to new major software supply chain attacks nearly every month: SolarWinds, Accellion, Click Studios, PHP, CodeCov, Kaseya, Log4Shell - the list goes on.

These incidents make it clear that attackers are hitting DevOps tools and infrastructure just as hard as production applications, looking for any entry point into the victim’s SDLC. After gaining access, they seek to expand laterally across each phase to tamper with code and push it live into production without detection. Ironically, the same DevOps automation that increases release efficiency also makes it easier for attackers to move laterally as each system becomes more tightly interconnected.

This webinar examines code tampering risks, shares lessons learned from recent incidents and proposes a four-pillar approach to reducing code tampering risk through:

  • Integrity validation: Confirming files and artifacts across each phase of the SDLC
  • Anomaly detection: Connecting dots from disparate systems to identify breaches
  • Critical code monitoring: Determining which code to monitor for any and all changes
  • Defense-in-depth: Applying security and governance policies across DevOps tools and cloud infrastructure
Jon Jarboe
Director of Product Marketing - Cycode
Jon Jarboe has been helping software development organizations improve processes and tools for over 20 years, in contexts ranging from embedded systems to complex distributed applications and roles including support, development, customer success, management, pre- and post-sales. He has spent the past 12 years helping organizations eliminate gaps and friction in their security program by embracing the needs of developers.
Orion Cassetto
Senior Director, Product Marketing - Cycode
Orion Cassetto has 15 years of experience marketing and product strategy for cybersecurity and web application security products. Prior to Cycode, Orion worked for other notable security vendors including Exabeam, Imperva, Incapsula, Distil Networks and Armorize Technologies. He is a security enthusiast and frequent speaker at conferences and trade shows.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.