Virtual
NOTE: This course will be offered virtually via Zoom
In an era where up to 80% of your code can come from third parties, the security of your software supply chain is more critical than ever. Software isn’t built in silos anymore. It’s built on a complex web of dependencies, with each component sourced from different providers across the globe. This opens up a myriad of vulnerabilities, making your software supply chain a prime target for cybercriminals.
From the Attacker’s Perspective - Understanding Software Supply Chain Attacks
The journey begins by exploring the reality of today’s software supply chains, software supply chain is not just your code dependencies there is a whole other set of software’s that are part of your supply chain and all need to be protected. We will dissect real-world attacks on software supply chains, understand how they unfolded, and examine their impacts.
Through hands-on exercises, you’ll step into the shoes of attackers, exploiting common vulnerabilities from developer environments and code repositories to dependencies and build/release tools. By the end of day one, you’ll fully comprehend how exposed your software supply chain could be in this interconnected digital world
From Vulnerability to Fortification - Securing Your Software Supply Chain
On the second day, we shift gears from understanding vulnerabilities to implementing robust defenses. We delve into industry standard frameworks such as SLSA and NIST SSDF, translating them into practical strategies for each component of your supply chain
You’ll get your hands dirty by applying these strategies to secure your developer environments, code repositories, and CI/CD pipelines. You will learn how to use Software Composition Analysis (SCA) tools to manage package/dependency vulnerabilities effectively, create SBoM’s for your own software. By the end of the course, you’ll be equipped to transform your software supply chain from a security liability to an asset.
In modern, fast-moving organizations, keeping pace with digital transformation initiatives without compromising security is a growing conundrum. This course caters to everyone in the IT industry, from developers and engineers to IT managers, security analysts, and CTOs
The nature of software development has changed; it’s high time our approach to securing it evolves too. This course offers not just knowledge, but practical skills to secure your software supply chain amidst this paradigm shift. It’s no longer enough to secure your code. You need to secure your software’s lifeline - the supply chain.
The class will contain a holistic view of software supply chain security both from attack and defense side, with focus on practical approach of learning with demos and hands-on labs -
Each section consists of -
The class is extensively hands-on with elaborate case studies from the real world and replicating the attacks to understand in depth on how to protect against them.
At the end of the two-day course, we will summarize the key points covered and offer suggestions for further learning. Each student will receive access to presentation slides, a constantly updating knowledge base, and a guide on setting up attack and defense infrastructure for self-practice purposes.
Beginner
Basic knowledge of software development and IT security concepts is assumed. Familiarity with cloud platforms and CICD processes would be beneficial but not mandatory.
Our labs are cloud based, and a browser should be sufficient. However we will still suggest following hardware specs:
Please ensure if any HIDS or Firewall is installed, we have admin access to disable in case it interferes with the lab setup.
We will need to make accounts on services like GitHub/bitbucket/AWS etc for practical hands-on experience those accounts will be created as part of the program itself (Instructions will be provided prior to the class so students can come prepared).
Anant Shrivastava is the founder of Cyfinoid Research which specializes in cybersecurity research. Previously he was a Technical Director at NotSoSecure Global Services, a boutique cyber security consultancy firm. He has been a trainer & a speaker at various international conferences (BlackHat-USA/ASIA/EU, Nullcon, c0c0n & many more). Anant also leads Open-Source projects, Tamer Platform & CodeVigilant. He also maintains the archive portal named Hacking Archives of India. In his free time, he likes to take part in open communities targeted towards spreading information security knowledge such as the null community, Garage4Hackers, hasgeek & OWASP.
Kumar Ashwin is a security professional specializing in web, cloud, and software supply chain security. With a notable presence in the field, he has delivered presentations and conducted training sessions for fellow security professionals at conferences such as x33fcon, BSides, and c0c0n. Actively participating in esteemed security communities like null - The Open Security Community, Winja, and DEFCON Cloud Village, Ashwin contributes through articulate speaking engagements at meetups and the creation of CTF challenges. Having transitioned from offensive security to security engineering, Ashwin brings a unique perspective to the discipline. His professional journey underscores a steadfast commitment to evolving methodologies, addressing the challenges inherent in security engineering, and ensuring the resilience of software supply chain. Ashwin’s expertise has proven instrumental in assisting numerous organizations in enhancing their security posture and safeguarding their assets. Check out Ashwin’s blog at https://krash.dev to learn more about his experiences and insights.