Attacks on the OS supply chain are becoming more sophisticated. What are the essential first steps, and what should you focus on in the beginning? This raises the question of suitable methods and tools. At the same time, the company's strategic orientation must be included in this security strategy.
A question occurred to me that I get asked again and again at conferences, meetups or workshops: The question is almost always: ####What are the quick wins or low hanging fruits if you want to deal more with the topic of security in software development? And I want to answer this question right now!
Priority access to all content
Video hallway track
Community chat
Exclusive promotions and giveaways