

TABLETOP EXERCISE: Are China and Russia in Your Software? How do you know?
Are China and Russia in Your Software? How Do You Know?
Sign up to be a hands-on participant!
As software supply chains become increasingly intricate, the threat of foreign adversaries infiltrating critical systems through compromised code has escalated dramatically. With open-source components forming the backbone of modern applications, often with dependency chains 60 levels deep, cybersecurity leaders face a daunting challenge: 6.8% of open-source software is of dubious origin, and over 20% is committed by anonymous developers.
This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights, tracing contributions from potentially hostile nations like China and Russia, and detecting recent software supply chain attacks that evade traditional security tools. Participants will leave with actionable strategies to strengthen software provenance, enhance visibility, and build resilience against increasingly stealthy and sophisticated threats.
This session is geared toward all public sector and defensive cybersecurity roles. This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights.
Must be registered for the 16th Annual Billington CyberSecurity Summit to participate.