Loading…
Attending this event?
Friday, June 28 • 11:00am - 11:30am
OWASP Dependency Track Fortifying the Supply Chain

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Modern application development relies heavily on third-party components, introducing vulnerabilities from the vast and ever-evolving software supply chain. This abstract highlights how OWASP Dependency-Track empowers developers and security professionals to proactively fortify their applications throughout the development lifecycle.

In the current threat landscape, software supply chains pose a significant risk to organizations. Malicious actors are increasingly targeting these interconnected ecosystems, exploiting weaknesses in third-party components to gain access to critical systems. This presentation explores Dependency-Track, an open-source, intelligent component analysis platform driven by the power of Software Bill of Materials (SBOM) and a flagship project of OWASP. It helps organizations maintain an accurate inventory of their software components and identify vulnerable ones.

We'll dive into how OWASP Dependency-Track empowers users to:

Gain Complete Visibility: Dependency-Tracks helps discover and track usage of libraries, third-party components and services used by your application to provide full-stack traceability for enterprises. This enterprise-ready, single source of truth provides a clear view of your attack surface, enabling informed decision-making.

Continuously Monitor for Vulnerabilities and compromised components: Dependency-Track integrates with multiple vulnerability intelligence sources such as the NVD, Sonatype OSS Index, VulnDB, Snyk and Trivy to proactively identify known security issues within your dependencies. Receive timely alerts through popular collaboration tools like Slack, Microsoft Teams etc. and prioritize remediation efforts based on severity and exploitability.

Malicious Component Identification: Dependency-Track's new integrity analysis feature empowers users to continuously analyze their portfolio for potential malicious components and operational risk within their software supply chain. Additionally, Dependency-Track can also detect known backdoors (like xz) using multiple intelligence sources and a policy feature. Automate Vulnerability and License Management: Dependency-Track enables organizations to enforce license policy compliance across their portfolio and also produce CycloneDX Vulnerability Disclosure Reports (VDR).

Speakers
avatar for Vinod Anandan

Vinod Anandan

SVP of Application Security
Vinod is an SVP of Application Security, he is leading a team of DevSecOps engineers and architects to develop tools and services which will help to improve the security and developers' experience. Vinod spends most of the time helping open source projects and standards


Friday June 28, 2024 11:00am - 11:30am WEST
Room: 5C-CCL
Feedback form isn't open yet.