
Most teams are not worried about writing code.
They are worried about what slips through it.
After incidents like SolarWinds hack and the Log4Shell vulnerability, software supply chain risk is no longer just a security team problem. It’s a board-level conversation.
Engineering leaders everywhere are being asked the same question:
Are we secure — or just hoping we are?
This session is a real, technical conversation about what’s happening inside modern CI/CD pipelines right now:
This is not a fear-driven talk.
This is a practical, engineer-to-engineer discussion.
• A clear understanding of where software supply chain risk enters the pipeline
• Insight into the visibility gaps most teams don’t realize they have
• Why legacy security checks fail in fast-moving DevOps environments
• How teams are responding faster when new vulnerabilities surface
• What secure, resilient, and auditable pipelines look like today
• Practical approaches to improving control without creating friction
What Makes This Different
No theory.
No surface-level slides.
No generic security awareness talk.
You’ll see real-world pipeline scenarios and how teams are using Harness in live environments to:
This is a working session for engineers who operate real systems.
• DevOps Engineers
• Platform Engineers
• Security Engineers
• Engineering Leaders
• Anyone responsible for build and release pipelines
If you touch CI/CD, infrastructure automation, or release governance — this session is for you.