The Lineaje Software Supply Chain Security Forum will serve as the nation’s premier conference focused on software supply chain risk which is a critical and rising concern for government, defense, and the broader national infrastructure. Through a mix of thought leadership, technical insight, and immersive engagement.
Over 30 of years in cybersecurity, led development of multiple AI-based security solutions and built one of the first antimalware/antivirus technologies which is still on the market today. He holds over 14 patents in cybersecurity. As a Fellow and CTO of McAfee, he led dozens of cybersecurity innovations from concept to commercial products. Recently he developed and launched the Lineaje AI platform.
Over 30 of years in cybersecurity, led development of multiple AI-based security solutions and built one of the first antimalware/antivirus technologies which is still on the market today. He holds over 14 patents in cybersecurity. As a Fellow and CTO of McAfee, he led dozens of cybersecurity innovations from concept to commercial products. Recently he developed and launched the Lineaje AI platform.
Over 30 years of experience in cybersecurity product management. He has built and scaled successfully, over 50 high-growth cybersecurity products, created Symantec's Central Console for all products in the cloud: ICDM (Integrated Cyber Defense Manager) and led Symantec’s SaaS business launch for Endpoint Security the largest SaaS endpoint protection product globally.
Over 30 years of experience in cybersecurity product management. He has built and scaled successfully, over 50 high-growth cybersecurity products, created Symantec's Central Console for all products in the cloud: ICDM (Integrated Cyber Defense Manager) and led Symantec’s SaaS business launch for Endpoint Security the largest SaaS endpoint protection product globally.
Ashok is the Chief Technology Officer at Trellix. As part of his mission Ashok leads technology and vision for XDR Products, Threat Research and Intelligence, AI (generative, predictive,edge) across prevention, detection, investigation, remediation and forensics. This is applied across XDR, SecOps, Endpoint, Network, Email.
Over 20 years of experience in the development and implementation of new and emerging technology solutions. Nick has experience leading cloud security, application security and cyber initiatives at multinational corporations and Government. Also led technical architecture efforts to implement the US Federal Government Data Consolidation program, FedRAMP and HealthCare.gov “fix it” initiatives supporting DoD, GSA and CMS respectively. Recipient of the Ken Ernst North America Innovators Award.
Over 20 years of experience in the development and implementation of new and emerging technology solutions. Nick has experience leading cloud security, application security and cyber initiatives at multinational corporations and Government. Also led technical architecture efforts to implement the US Federal Government Data Consolidation program, FedRAMP and HealthCare.gov “fix it” initiatives supporting DoD, GSA and CMS respectively. Recipient of the Ken Ernst North America Innovators Award.
Explore the intricacies of securing software development at scale within government entities. This session will cover the methodologies and strategies employed to ensure robust security measures are in place, from initial development stages to deployment. Learn how government agencies are adapting to the rapid pace of software innovation while maintaining stringent security protocols.
As software supply chains become increasingly intricate, the threat of foreign adversaries infiltrating critical systems through compromised code has escalated dramatically. With open-source components forming the backbone of modern applications, often with dependency chains 60 levels deep, cybersecurity leaders face a daunting challenge: 6.8% of open-source software is of dubious origin, and over 20% is committed by anonymous developers.
This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights, tracing contributions from potentially hostile nations like China and Russia, and detecting recent software supply chain attacks that evade traditional security tools.
Participants will leave with actionable strategies to strengthen software provenance, enhance visibility, and build resilience against increasingly stealthy and sophisticated threats.This session is geared toward all public sector and defensive cybersecurity roles.
Register to participate, or come by and watch.This interactive tabletop exercise draws on intelligence and threat patterns uncovered by a global community of security experts, distilling hard-to-find signals into actionable insights.