activestate-logo-white

Webinar Series | Securing the Pipeline:

Turning Vulnerable Containers into Trusted Assets

Building containers isn’t just about speed; it’s about trust across every layer.

In this 20-minute session, we’ll walk through practical strategies to harden your images, lock down your dependencies, and secure your CI/CD pipelines against software supply chain attacks.

Tuesday, October 28 · 8 AM PT | 10 AM CT | 11 AM ET 

What You'll Learn

Image Hardening & Minimization:

How stripping your containers of unnecessary components reduces vulnerabilities and tightens your attack surface.

Provenance & Dependency Management:

The importance of verifiable provenance and dependency management to protect against malicious or outdated packages.

Real World Supply Chain Attacks:

We’ll examine a few examples of real-world supply chain attacks to uncover what went wrong and how they could have been avoided.

The session will conclude with best practices for creating secure containers, such as image minimization and building from source, providing your teams with a roadmap to move quickly without compromising security.

Format: 20-minute presentation + 10 minutes of live Q&A.

Featured Speakers

Marc Gutman

Speaker

Build Engineer
ActiveState

Moris Chen

Speaker

VP, Customer Success
ActiveState

 

Evan Prowse

Moderator

Product Marketing Manager
ActiveState

Register Today

activestate-logo