Understanding, maintaining and securing Envoy's supply chain - Michael Payne, Harvey Tuch
Securing Diverse Supply Chains Across Interconnected Systems - Wayne Starr & Aaron Creel
Protecting Ourselves from CNCFgate. Software Supply Cha... Andres Vega, Emily Fox & Jonathan Meadows
Keynote: SBOM is Coming: Why You Should Care and How You Can Help - Frederick Kautz & Allan Friedman
Securing your supply chain (and learning how to rob a bank) | BCS Merseyside Branch
A New Way To Roll: Supply Chain Choreography For Enterprise Grade... - Kirti Apte & Steve Watkins
Maintaining the massive success of Envoy (Interview)
Completely Securing the Software Supply Chain using Grafeas + in-toto - Lukas Puehringer
Keynote: Approaching the SBOM: Best Practice for Software Supply Chain Security - Daniel Nurmi
Public-private sector cooperation in APEC to reduce food losses
Keynote: A Secure Supply Chain Vision - Luke Hinds, Security Lead, Office of the CTO, Red Hat
UK on international peace & security - Security Council Media Stakeout (29 August 2018)
Keynote: Vulnerability Data is Not Enough: The Case for an Actionable UI - Kara Yimoyines, VMware
Securing Kafka with SPIFFE at TransferWise - Jonathan Oddy, Levani Kokhreidze
Beyond signatures: Using TUF and Notary to Secure Software Distribution - Marina Moore, NYU
How Salesforce is using ArgoWorkflows for provisioning add-ons - Mayank Kumar & Andy Chen
Securing CI/CD Systems Through eBPF - Alex Ilgayev, Cycode
Releasing Kubernetes Less Often and More Secure – The SIG Release Update
Real World SPIFFE Scenarios and Outcomes - Andres Vega & Frederick Kautz, SPIFFE Steering Committee
Securing Content Distribution with The Update Framework (TUF) - Lukas Puehringer & Joshua Lock