Name
Preventing Cyber Attacks With Trusted Image Registries
Time
12:30 PM - 12:45 PM (EDT)
Description

We've all heard about the cyberattacks on the US Government that took advantage of the software deployment process. And if it can happen to the US Government, it can happen to you. Fortunately, there is a way to close the loophole attackers took advantage of by ensuring that the software you're installing is actually the software you think you're installing. In this session we'll look at potential issues in the CI/CD process, and how you can plug those holes through the use of a trusted container image registry.

Bryan Langston