Loading…
June 26, 2025 | Denver, Co
Learn More and Register To Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for OpenSSF Community Day NA 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Mountain Daylight Time. To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.

Schedule is subject to change.
Type: 20-minute Sessions clear filter
Thursday, June 26
 

10:30am MDT

OSPS: All Your Base Are Belong To Us - Christopher Robinson, OpenSSF & Eddie Knight, Sonatype
Thursday June 26, 2025 10:30am - 10:50am MDT
Contributors and maintainers will benefit from increased visibility to changes in the ecosystem, especially as LFX Insights works to display Baseline results for all projects. The baseline is already fully adopted as a project requirement by the OpenSSF TAC, and adoption is underway by the FINOS and CNCF technical oversight committees. Past or Present Chairs from each of the three bodies are leading contributors to the effort.

End User members will benefit by better understanding the measures that Linux Foundation is taking to ensure that projects are being held to robust security standards.
Speakers
avatar for Eddie Knight

Eddie Knight

OSPO Lead, Sonatype
Eddie Knight is a Software and Cloud Engineer with a background in banking technology. When he isn’t playing with his 2-year-old son, he combines his passion and job duties by working to improve the security of open source software. Eddie helps lead CNCF's Security Technical Advisory... Read More →
Thursday June 26, 2025 10:30am - 10:50am MDT
Bluebird Ballroom 3B

10:30am MDT

Who Are You Building For: Pipelines Have a Purpose - Andrew McNamara & Julen Landa Alustiza, Red Hat
Thursday June 26, 2025 10:30am - 10:50am MDT
Software is built for a purpose. The same property applies to build platforms!

We will show you how we are leveraging Tekton and Tekton Chains at Red Hat to create a build platform that meets developers where they are at. Developers start with the pipeline defined in their git repository – free for them to modify and update on their terms, with Tekton tasks ready to scan artifacts for vulnerabilities and Renovate pre-configured to help keep dependencies up to date.

This platform helps make sure that the artifacts are going somewhere. Using the detailed SLSA Provenance generated by Tekton Chains, the build platform enables policy driven development. Developers can see in their PRs whether they are on track to meet the target’s requirements – whether it is pushing to a development or production environment. Gone are the days saying “I didn’t know I had to do that!”

We won’t send the artifacts just anywhere, however, as we can tailor policies to ensure that you are meeting all of the requirements. The platform can inspect the provenance to ensure that artifacts are built using trusted steps and all required checks are good for takeoff!
Speakers
avatar for Andrew McNamara

Andrew McNamara

Engineer, Red Hat
Andrew McNamara is passionate about usable CI/CD, security, and DevSecOps, drawing from his experience of building and shipping containerized software at IBM and Red Hat. As a SLSA maintainer, Andrew is helping people identify how to approach and understand supply chain security... Read More →
avatar for Julen Landa Alustiza

Julen Landa Alustiza

Ansible Delivery Pipelines Architect, Red Hat
I am an Open Source enthusiast currently working for Red Hat as Ansible Delivery Pipelines techincal lead.
Thursday June 26, 2025 10:30am - 10:50am MDT
Bluebird Ballroom 3A

11:25am MDT

Living Off the Pipeline: From Supply Chain 0-Days To Predicting the Next XZ-like Attacks - François Proulx, BoostSecurity.io
Thursday June 26, 2025 11:25am - 11:45am MDT
The next wave of Supply Chain attacks is brewing in our Build Pipelines (CI/CD), where 0-days and novel attack paths are still waiting to be discovered. In 2024, the XZ compression library compromise was used as a trojan horse to backdoor OpenSSH, it was caught early on, next time it might go unnoticed.

We tell the story of how we went from finding 0-day vulnerabilities in the Build Pipelines of critical Open Source packages to predicting TTPs for the next XZ-like attacks, adapting MITRE's ATT&CK for CI/CD. We'll go in depth on how Threat Actors can "Live Off the Pipeline" by abusing legitimate build tools to do their bidding.

We introduce practical methods for predicting and identifying threats, by mapping build pipeline tactics to our ATT&CK model. Case studies, based on forensics of recent supply chain compromises, will demonstrate how adversaries exploit build pipelines, escalate privileges, and can remain undetected long enough to have significant impact.

This session empowers attendees to proactively identify and defend against advanced supply chain attacks, effectively countering adversaries that seek to "Live Off the Pipeline" as demonstrated in the XZ compromise.
Speakers
avatar for François Proulx

François Proulx

Senior Product Security Engineer, BoostSecurity.io
François is a Senior Product Security Engineer for BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps... Read More →
Thursday June 26, 2025 11:25am - 11:45am MDT
Bluebird Ballroom 3A

2:15pm MDT

Shadow Vulnerabilities in AI/ML Data Stacks - What You Don’t Know CAN Hurt You - Mic McCully, Oligo Security
Thursday June 26, 2025 2:15pm - 2:35pm MDT
Open-source AI software introduces a new family of vulnerabilities to organizations. Some components in AI, like model serving, include Remote Code Execution (RCE) by design, like when loading pre-trained models from external sources.

This talk will examine some of the common security anti-patterns prevalent in AI engineering, such as security issues that are not classified as CVEs by design, or patched security issues that introduce breaking changes and therefore are not practically implemented. We’ll review the methods introduced for better security hygiene such as new checkpoint formats (model files on disk) - like SavedModel and SafeTensors.

While SCA, SAST, and traditional approaches don't analyze model checkpoints, leaving these silent vulnerabilities in your stacks, we’ll demo through real code examples, why the runtime context is crucial to detect these security issues––and how this can be achieved by leveraging eBPF and open source tooling.
Speakers
avatar for Mic McCully

Mic McCully

Field CTO, Oligo Security
Mic is an experienced senior security advocate who has spent his career evangelizing security software as a business enablement solution in some of the earliest security startups, as well as in significant positions within leading global security software enterprises. His security... Read More →
Thursday June 26, 2025 2:15pm - 2:35pm MDT
Bluebird Ballroom 3B

2:15pm MDT

SLSA Dependency Track Update - Meder Kydyraliev, Google & Adrian Diglio, Microsoft
Thursday June 26, 2025 2:15pm - 2:35pm MDT
A status update on the SLSA Dependency Track from the members of the working group. In the update we'll outline the objectives we are trying to achieve with the dependency track, highlight some of the challenges and the next steps.
Speakers
avatar for Meder Kydyraliev

Meder Kydyraliev

GOSST, Google
Meder is a lead on the Google Open Source Security Team where he drives initiatives to secure all aspects of the open source software supply chain, including secure dependency management practices, vulnerability management, artifact integrity and policy enforcement.
avatar for Adrian Diglio

Adrian Diglio

Secure Software Supply Chain, Microsoft
Adrian Diglio leads the Secure Software Supply Chain (S3C) team that secures Microsoft's end-to-end software supply chain. He leads Microsoft's SBOM efforts and published and contributed the Secure Supply Chain Consumption Framework (S2C2F) to the OpenSSF. He is an inventor, conference... Read More →
Thursday June 26, 2025 2:15pm - 2:35pm MDT
Bluebird Ballroom 3A

3:10pm MDT

Enhancing Supply Chain Security: Integrating Zarf and GUAC for Seamless SBOM Generation and Delivery - Brandt Keller, Defense Unicorns
Thursday June 26, 2025 3:10pm - 3:30pm MDT
Software supply chain security is a critical concern for organizations operating in both connected and disconnected environments. The OpenSSF projects Zarf and GUAC (Graph for Understanding Artifact Composition) provide complementary capabilities to enhance security and transparency. Zarf enables the secure packaging and deployment of software in connected or disconnected environments, while GUAC aggregates and contextualizes Software Bill of Materials (SBOMs) to improve software provenance and risk assessment.

This talk will explore how integrating Zarf and GUAC can streamline SBOM generation, verification, and delivery across connected and disconnected environments. We will demonstrate how this integration facilitates:
- Secure SBOM packaging and transport with Zarf.
- Automated SBOM generation and enrichment using GUAC.
- Improved traceability and risk assessment in airgapped environments.

Attendees will gain practical insights into leveraging these OpenSSF projects to strengthen their supply chain security posture and meet emerging compliance requirements.
Speakers
avatar for Brandt Keller

Brandt Keller

OSS Maintainer, Defense Unicorns
Brandt is a Software Engineer with a passion for Open Source. As a Maintainer and Contributor to multiple Open Source projects, he finds distinct pleasure in solving difficult problems and being a voice for Critical - Regulated - and Air-Gapped environments (most often all of the... Read More →
Thursday June 26, 2025 3:10pm - 3:30pm MDT
Bluebird Ballroom 3B

3:10pm MDT

Harnessing In-toto Attestations for Security and Compliance With Next-gen Policies - Marcela Melara, Intel Labs & Trishank Kuppusamy, Datadog
Thursday June 26, 2025 3:10pm - 3:30pm MDT
U.S. executive orders 14028 and 14144 are driving greater adoption of supply chain security and transparency. The in-toto framework, a widely-deployed CNCF project, provides tools and data formats for generating and verifying authenticated supply chain metadata such as SBOMs and SLSA Build Provenance. in-toto plays a central role in enabling vendors to comply with regulations, but consumers and auditors still face challenges defining intuitive policies that allow them to derive meaning from existing attestations.

This session will present ongoing work on in-toto policies, where the community has been (re)defining policy specification and artifact verification for a rapidly evolving supply chain ecosystem. It starts with a brief introduction to the in-toto Attestation Framework, which is a standard way to describe supply chain data. This will be followed by sharing how the previous version of in-toto policies were unfortunately incompatible with new attestations formats. This concludes by demoing in-toto’s new policy framework that not only links attestations but also does so in more powerful, flexible, and user-friendly ways that accommodate a wide variety of real-world use cases.
Speakers
avatar for Marcela Melara

Marcela Melara

Research Scientist, Intel Labs
Marcela Melara is a research scientist in the Security and Privacy Research group at Intel Labs. Her current work focuses on developing solutions for high-integrity software and AI supply chains. She leads a number of internal, academic and open-source projects on supply chain and... Read More →
Thursday June 26, 2025 3:10pm - 3:30pm MDT
Bluebird Ballroom 3A
 
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.