Share

Live Webinar – March 7th, 2023 1:00 pm – 2:00 pm EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: SD Times (Software Development Times)

Software supply chain attacks mainly happen because 80-90% of all software developed relies on third party dependencies.

Most of these attacks don’t happen with the dependencies you implicitly state but the transitive dependencies they rely on.

The most dangerous of these attacks happen on a “Zero Day” which is where a vulnerability is found with no patch or fix available.

There are 3 types of “Zero Day” which can affect a companies’ reputation, credibility, and financials:

  • Zero Day Vulnerability
  • Zero Day Exploit
  • Zero Day Attack

In this webinar, William Manning (LinkedIn profile) Solution Architect @ JFrog will show you how to use The JFrog Platform to combat these potential threats to your organization throughout the Software Development Life Cycle (SDLC) from “Shift Left” to “Ship Right” to provide complete coverage. We will discuss the following topics:

  • Types of Zero days
  • Front-line defense – “Shift Left” using automated evaluation, IDE plugins, and our CLI
  • “Blast Radius” – just because you discovered a zero day in one project doesn’t mean it isn’t affecting other projects. Find all usage of any “Zero Day”
  • Jira and Slack integrations for faster notifications, actions and remediation.
  • Integration into SDLC CI tools

Click to register for:
Zero Day Doesn’t Mean Zero Hope

0 0 1.0
Ways Of Working Technical
Power Skills
Leadership
Business Acumen Strategic / Business

NOTE: For PMI® Audit Purposes – Print Out This Post! Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.