Cover Image for TABLETOP EXERCISE: Are China and Russia in Your Software? How do you know?
Cover Image for TABLETOP EXERCISE: Are China and Russia in Your Software? How do you know?
70 Went

TABLETOP EXERCISE: Are China and Russia in Your Software? How do you know?

Hosted by Mikala Vidal & Roland Hansen
Registration
Past Event
Welcome! To join the event, please register below.
About Event

Are China and Russia in Your Software? How Do You Know?

Sign up to be a hands-on participant!

As software supply chains become increasingly intricate, the threat of foreign adversaries infiltrating critical systems through compromised code has escalated dramatically. With open-source components forming the backbone of modern applications, often with dependency chains 60 levels deep, cybersecurity leaders face a daunting challenge: 6.8% of open-source software is of dubious origin, and over 20% is committed by anonymous developers. 

This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights, tracing contributions from potentially hostile nations like China and Russia, and detecting recent software supply chain attacks that evade traditional security tools. Participants will leave with actionable strategies to strengthen software provenance, enhance visibility, and build resilience against increasingly stealthy and sophisticated threats.

This session is geared toward all public sector and defensive cybersecurity roles. This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights.

Must be registered for the 16th Annual Billington CyberSecurity Summit to participate.

Location
Lineaje Forum at the 16th Annual Billington CyberSecurity Summit
70 Went