Cover Image for The Anatomy of Supply Chain Attacks
Cover Image for The Anatomy of Supply Chain Attacks
Avatar for Aikido Security
Presented by
Aikido Security
No bullsh*t security for developers.

The Anatomy of Supply Chain Attacks

Virtual
Registration
Welcome! To join the event, please register below.
About Event

We’re pulling back the curtain on how modern supply chain attacks actually work.

Hosted by Mackenzie, this live session will break down real-world examples of attackers slipping malware into dependencies, backdooring SDKs, and exploiting blind spots in CI/CD. No theory, no fluff. Just a clear look at the tactics and what you can do to stay ahead.

You’ll learn:
• How attackers sneak malicious code into the software supply chain
• What recent incidents tell us about evolving tactics
• Practical steps to protect your own pipelines


​Brought to you by Aikido, serving up no bullsh*t security to developers worldwide. Made with 💜 in Europe.

Get security done 🤝 get back to building.

Avatar for Aikido Security
Presented by
Aikido Security
No bullsh*t security for developers.