

Presented by
Aikido Security
No bullsh*t security for developers.
Hosted By
The Anatomy of Supply Chain Attacks
Registration
About Event
We’re pulling back the curtain on how modern supply chain attacks actually work.
Hosted by Mackenzie, this live session will break down real-world examples of attackers slipping malware into dependencies, backdooring SDKs, and exploiting blind spots in CI/CD. No theory, no fluff. Just a clear look at the tactics and what you can do to stay ahead.
You’ll learn:
• How attackers sneak malicious code into the software supply chain
• What recent incidents tell us about evolving tactics
• Practical steps to protect your own pipelines
Brought to you by Aikido, serving up no bullsh*t security to developers worldwide. Made with 💜 in Europe.
Get security done 🤝 get back to building.
Presented by
Aikido Security
No bullsh*t security for developers.
Hosted By