AI Engineer - Learn how to integrate AI into software applications
Master AI & Data—50% Off Udacity (Code CC50)
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to implement comprehensive supply chain security measures through this 12-minute conference talk that demonstrates how to integrate Software Bill of Materials (SBOMs), Supply-chain Levels for Software Artifacts (SLSA) framework, and CI/CD pipeline security controls. Explore the evolving landscape of software security threats and understand why traditional perimeter-based security approaches are insufficient for modern development environments. Discover how to adopt a "defense by default" strategy that embeds security controls directly into your development pipeline rather than treating security as an afterthought. Master the creation and utilization of SBOMs to maintain visibility into software components and their provenance throughout the development lifecycle. Examine practical implementation of the SLSA framework to establish verifiable security levels for your software artifacts and build processes. Analyze key security controls including source code integrity verification, build environment hardening, artifact signing, and automated vulnerability scanning. Follow a detailed practical example that demonstrates end-to-end supply chain defense implementation, from initial development through deployment and enforcement phases. Understand the cultural and organizational changes required to successfully adopt supply chain security practices across development teams. Gain actionable insights for strengthening your organization's software supply chain security posture through proven frameworks and real-world implementation strategies.
Syllabus
00:00 Introduction and Speaker Background
00:33 Focus on Supply Chain Security
01:12 The Changing Landscape of Software Security
02:47 Defense by Default: Integrating Security into the Pipeline
03:28 The Role of SBOMs and Provenance
05:06 Implementing SLSA Framework
05:38 Key Controls for Strengthening the Pipeline
07:16 Practical Example of Supply Chain Defense
08:20 Deployment and Enforcement
09:22 Cultural Shift in Supply Chain Security
10:05 Key Takeaways and Conclusion
Taught by
Conf42