Loading…
June 26, 2025 | Denver, Co
Learn More and Register To Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for OpenSSF Community Day NA 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Mountain Daylight Time. To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.

Schedule is subject to change.
Venue: Bluebird Ballroom 3A clear filter
Thursday, June 26
 

9:00am MDT

Welcome + Opening Remarks - Steve Fernandez, General Manager, OpenSSF, The Linux Foundation
Thursday June 26, 2025 9:00am - 9:15am MDT
Speakers
avatar for Steve Fernandez

Steve Fernandez

General Manager, OpenSSF, Linux Foundation
Thursday June 26, 2025 9:00am - 9:15am MDT
Bluebird Ballroom 3A

9:15am MDT

Keynote: Security Work isn't Special - Seth Larson, Security Developer-in-Residence, Python Software Foundation
Thursday June 26, 2025 9:15am - 9:30am MDT
Confidential. Sensitive. Security-critical.

What do these words mean in practice for open source today? That only the most resource-constrained actors in the system can do the work. These forces are in direct contradiction to what makes open source powerful: that the people most interested in the improvements are the ones that can do the work.

So why don’t we?

In this talk, we’ll challenge this thinking around open source security work and attendees will leave with new tools on how to make their contributions into open source security guidance, platforms, and tooling scale by inviting others to the table, turning expertise into results, and improving the security of the open source ecosystem in a way maintainers will love rather than dread.
Speakers
avatar for Seth Larson

Seth Larson

Security Developer-in-Residence, Python Software Foundation
Seth is the Security Developer-in-Residence at the Python Software Foundation working to improve the security posture of the Python ecosystem. Seth maintains widely used open source Python projects like urllib3, truststore, and Requests.
Thursday June 26, 2025 9:15am - 9:30am MDT
Bluebird Ballroom 3A

9:30am MDT

Keynote: Sarah Evans, Distinguished Engineer, Dell Technologies
Thursday June 26, 2025 9:30am - 9:40am MDT
Speakers
avatar for Sarah Evans

Sarah Evans

Distinguished Engineer, Dell Technologies
Sarah is a security innovation researcher, leveraging diverse experiences as an IT and security practitioner to improve security by design in emerging technologies. Prior to Dell, Sarah has had roles at in the finance, defense, manufacturing and education industries. Sarah also contributes... Read More →
Thursday June 26, 2025 9:30am - 9:40am MDT
Bluebird Ballroom 3A

9:45am MDT

Keynote Session To Be Announced - Andrew Carney, Program Manager, Information Innovation Office, DARPA
Thursday June 26, 2025 9:45am - 10:00am MDT
Speakers
avatar for Andrew Carney

Andrew Carney

Program Manager, Information Innovation Office, Defense Advanced Research Projects Agency (DARPA)
Andrew Carney is program manager for the DARPA AI Cyber Challenge (AIxCC). He is also a program manager at the Advanced Research Projects Agency for Health (ARPA-H) where he leads programs and projects to improve health cybersecurity.Carney was previously a principal researcher in... Read More →
Thursday June 26, 2025 9:45am - 10:00am MDT
Bluebird Ballroom 3A

10:10am MDT

Taming the Wild West of ML: Practical Model Signing With Sigstore on Kaggle - Mihai Maruseac, Google
Thursday June 26, 2025 10:10am - 10:25am MDT
The rapid evolution of LLMs and the ML field has ushered in remarkable progress, but also a new wave of security threats. Model poisoning, supply chain vulnerabilities, and the challenge of verifying model and data provenance are just a few of the risks we face.

We've developed an efficient solution to sign models with Sigstore, at scale. This talk explores the practical experience of integrating this solution into Kaggle, a leading platform for data science and machine learning. We’ll share our journey of implementing model signing, from initial design to overcoming technical hurdles, and the resulting impact on Kaggle's community and the broader ML ecosystem.

Attendees will learn about the benefits of model signing, the challenges of large-scale platform integration, and best practices for securing ML workflows. By sharing actionable insights, we aim to empower other model hubs to adopt similar solutions. Protecting the integrity of all ML models through widespread adoption will prevent a significant number of ML supply chain incidents.
Speakers
avatar for Mihai Maruseac

Mihai Maruseac

Staff SWE, Google
Mihai Maruseac is a member of Google Open Source Security team (GOSST), working on Supply Chain Security, specifically for ML, but also a GUAC maintainer. Before joining GOSST, Mihai created the TensorFlow Security team after joining Google, moving from a startup to incorporate Differential... Read More →
Thursday June 26, 2025 10:10am - 10:25am MDT
Bluebird Ballroom 3A

10:30am MDT

Who Are You Building For: Pipelines Have a Purpose - Andrew McNamara & Julen Landa Alustiza, Red Hat
Thursday June 26, 2025 10:30am - 10:50am MDT
Software is built for a purpose. The same property applies to build platforms!

We will show you how we are leveraging Tekton and Tekton Chains at Red Hat to create a build platform that meets developers where they are at. Developers start with the pipeline defined in their git repository – free for them to modify and update on their terms, with Tekton tasks ready to scan artifacts for vulnerabilities and Renovate pre-configured to help keep dependencies up to date.

This platform helps make sure that the artifacts are going somewhere. Using the detailed SLSA Provenance generated by Tekton Chains, the build platform enables policy driven development. Developers can see in their PRs whether they are on track to meet the target’s requirements – whether it is pushing to a development or production environment. Gone are the days saying “I didn’t know I had to do that!”

We won’t send the artifacts just anywhere, however, as we can tailor policies to ensure that you are meeting all of the requirements. The platform can inspect the provenance to ensure that artifacts are built using trusted steps and all required checks are good for takeoff!
Speakers
avatar for Andrew McNamara

Andrew McNamara

Engineer, Red Hat
Andrew McNamara is passionate about usable CI/CD, security, and DevSecOps, drawing from his experience of building and shipping containerized software at IBM and Red Hat. As a SLSA maintainer, Andrew is helping people identify how to approach and understand supply chain security... Read More →
avatar for Julen Landa Alustiza

Julen Landa Alustiza

Ansible Delivery Pipelines Architect, Red Hat
I am an Open Source enthusiast currently working for Red Hat as Ansible Delivery Pipelines techincal lead.
Thursday June 26, 2025 10:30am - 10:50am MDT
Bluebird Ballroom 3A

10:55am MDT

Myths Developers Believe About Open Source Security - Jess Lowe & Tim Zhang, Google
Thursday June 26, 2025 10:55am - 11:05am MDT
Forget what you think you know about immutable tags, perfect dependency graphs, and those supposedly foolproof lock files. We'll get down to the nitty-gritty of open source security, giving you real-world insights to keep your projects safe. For example, did you know that one package url (or “purl”) can map to many different packages? Trying to find consistency in cross-ecosystem names and identifiers is a hard problem! And how can we meaningfully report vulnerabilities if we don’t even have a consistent way to identify packages?

We can talk about vulnerabilities in transitive dependencies, but what even are your dependencies? A package doesn’t uniquely map to one set of dependencies – depending on your build flags or operating system, you can end up with arbitrarily many dependency graphs for one package.

We break open source security down to first principles by challenging the assumptions that we’ve all built upon, to hopefully resolve to a more consistent vision of the open source.

Number 5 will shock you!
Speakers
avatar for Jess Lowe

Jess Lowe

Software Engineer, Google
Jess is a Software Engineer in the Google Open Source Security Team working on OSV.dev and OSV-Scanner.
avatar for Tim Zhang

Tim Zhang

Engineer at Deps.dev, Google
A software engineer at Google. Relative newcomer to the field of securing the software supply chain.
Thursday June 26, 2025 10:55am - 11:05am MDT
Bluebird Ballroom 3A

11:25am MDT

Trends and Insights from the Sigstore Ecosystem - Eve Martin-Jones & Hayden Blauzvern, Google
Thursday June 26, 2025 11:25am - 11:45am MDT
Dive into the Sigstore ecosystem and discover insights about digital signing practices!

Sigstore provides tooling and services to simplify signing and verification. Critically, it makes signatures transparent and publicly auditable to detect malicious behavior. With the increasing adoption of Sigstore within open source communities, this has led to a wealth of information about supply chain security. Using the data in Sigstore's public transparency log Rekor, we can glean insights about signing in open source.

This talk will provide a brief overview of Sigstore, explaining its core components and how it enables secure digital signing. We will explore trends in how open source communities and organizations are utilizing Sigstore for signing, and answer questions such as, "What is the most commonly used identity provider?", "Do we see signing occur uniformly across a day?", and "How prevalent is the use of short-lived certificates rather than self-managed keys?"

Finally, we will describe how to access and leverage this data to find your own insights about the Sigstore ecosystem and signing in supply chain security.
Speakers
avatar for Hayden Blauzvern

Hayden Blauzvern

Technical Lead Manager, Google
Hayden Blauzvern is a technical lead manager on Google’s Open Source Security Team, focused on making open-source software more secure through code signing and applied transparency. Hayden is a maintainer and the community chair on the Sigstore project.
avatar for Eve Martin-Jones

Eve Martin-Jones

Senior Software Engineer, Google
Eve is an engineer working on open source software security at Google. She lives in Australia, with her cat Mochi, who is surprisingly proficient at JavaScript. Between D&D campaigns, she can be found deciphering the Cargo dependency-resolution algorithm bug-for-bug, advocating for... Read More →
Thursday June 26, 2025 11:25am - 11:45am MDT
Bluebird Ballroom 3A

11:25am MDT

Living Off the Pipeline: From Supply Chain 0-Days To Predicting the Next XZ-like Attacks - François Proulx, BoostSecurity.io
Thursday June 26, 2025 11:25am - 11:45am MDT
The next wave of Supply Chain attacks is brewing in our Build Pipelines (CI/CD), where 0-days and novel attack paths are still waiting to be discovered. In 2024, the XZ compression library compromise was used as a trojan horse to backdoor OpenSSH, it was caught early on, next time it might go unnoticed.

We tell the story of how we went from finding 0-day vulnerabilities in the Build Pipelines of critical Open Source packages to predicting TTPs for the next XZ-like attacks, adapting MITRE's ATT&CK for CI/CD. We'll go in depth on how Threat Actors can "Live Off the Pipeline" by abusing legitimate build tools to do their bidding.

We introduce practical methods for predicting and identifying threats, by mapping build pipeline tactics to our ATT&CK model. Case studies, based on forensics of recent supply chain compromises, will demonstrate how adversaries exploit build pipelines, escalate privileges, and can remain undetected long enough to have significant impact.

This session empowers attendees to proactively identify and defend against advanced supply chain attacks, effectively countering adversaries that seek to "Live Off the Pipeline" as demonstrated in the XZ compromise.
Speakers
avatar for François Proulx

François Proulx

Senior Product Security Engineer, BoostSecurity.io
François is a Senior Product Security Engineer for BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps... Read More →
Thursday June 26, 2025 11:25am - 11:45am MDT
Bluebird Ballroom 3A

11:50am MDT

From Model To Trust: Building Upon Tamper-proof ML Metadata Records - Mihai Maruseac, Google & Eoin Wickens, HiddenLayer
Thursday June 26, 2025 11:50am - 12:05pm MDT
The integrity and provenance of machine learning models are critical for building trustworthy AI systems. While cryptographic signing protects many digital assets, a standardized approach for verifying model origins and ensuring they haven't been tampered with is still missing. We are addressing this gap by building upon the OpenSSF Model Signing project – a PKI-agnostic method for creating verifiable claims on bundles of ML artifacts. We show how this project can expand beyond just model signing to also cover datasets, and other associated files, recording all integrity information in a single manifest.

In fact, this can be used as a foundation layer upon which we can build useful AI supply-chain solutions, both in terms of security and in terms of reducing development costs. Imagine querying "What datasets were used to train this model?" or determining which models and agents have been trained on a poisoned dataset, even before these get deploy in production systems. This is all possible by merging model signing, model cards, SLSA and AI-BOM information and analyzing all this metadata using tools such as GUAC. Our talk lays the groundwork for such capabilities.
Speakers
avatar for Mihai Maruseac

Mihai Maruseac

Staff SWE, Google
Mihai Maruseac is a member of Google Open Source Security team (GOSST), working on Supply Chain Security, specifically for ML, but also a GUAC maintainer. Before joining GOSST, Mihai created the TensorFlow Security team after joining Google, moving from a startup to incorporate Differential... Read More →
avatar for Eoin Wickens

Eoin Wickens

Director of Threat Intelligence, HiddenLayer
Eoin Wickens is the Technical Research Director - Field at HiddenLayer, where he both researches and speaks about security for artificial intelligence and machine learning. He has previously worked in threat research, threat intelligence and malware reverse engineering and has been... Read More →
Thursday June 26, 2025 11:50am - 12:05pm MDT
Bluebird Ballroom 3A

12:10pm MDT

Predicting OSS Vulnerabilities Through Communication Analysis: A Work in Progress - Shlok Gilda, University of Florida
Thursday June 26, 2025 12:10pm - 12:25pm MDT
Open-source software security depends not only on code quality but also on the health and effectiveness of developer communication. This session presents ongoing research developing “FORCE” (Framework for Open-Source Risk and Community Evaluation), a novel framework for proactively assessing OSS project risk. We will analyze communication patterns (sentiment, toxicity, outrage, stance, and key discussion topics) within GitHub repositories, combined with contributor network analysis and vulnerability data. This session will detail the methodology for creating the “Temporal Health Score” (THS), a composite metric designed to provide early warnings of potential security risks. We will discuss how prior research in areas like subtle toxicity detection and behavioral analysis informs the design of FORCE. The session will emphasize the potential for actionable insights for OSS maintainers, including strategies for improving communication, fostering collaboration, and mitigating identified risks. We also seek community feedback on the framework and its potential applications.
Speakers
avatar for Shlok Gilda

Shlok Gilda

PhD Candidate, University of Florida
Shlok Gilda is a 5th year PhD Candidate at the University of Florida in the Natural Language Research & Culture (NLP&C) Lab, advised by Dr. Bonnie J. Dorr. His research interests span critical cybersecurity domains, including user privacy, identity and access management, and vulnerability... Read More →
Thursday June 26, 2025 12:10pm - 12:25pm MDT
Bluebird Ballroom 3A

12:30pm MDT

Beyond the Bot: Building Secure and Resilient AI Agents With Open Source - Mihai Maruseac, Google & Sarah Evans, Dell Technologies
Thursday June 26, 2025 12:30pm - 12:45pm MDT
2025 is the year LLMs broke out of the chatbot box. AI agents can now plan, execute, and learn all on their own in complex environments. This evolution makes 2023 seem like the stone age of AI. But with great power comes great responsibility - and a whole new attack surface to worry about: agentic AI demands a robust security model.

This talk dives into the world of AI agents, exploring what they are, what they can do, and—crucially—how to secure them. We'll examine the open-source tools that are fueling this revolution, including LangChain, LangGraph, DSPy, and the growing ecosystem of knowledge graph technologies and APIs. These powerful tools present incredible opportunities, but their architectural choices also introduce unique security risks. We'll dissect some of these risks, such as prompt injection and data poisoning, as well as compromised dependencies and insecure API interactions.

Our aim is to provide a guide on how to build secure and resilient AI agents using open-source best practices, ensuring today’s intelligent creations don't become tomorrow's security nightmares.
Speakers
avatar for Mihai Maruseac

Mihai Maruseac

Staff SWE, Google
Mihai Maruseac is a member of Google Open Source Security team (GOSST), working on Supply Chain Security, specifically for ML, but also a GUAC maintainer. Before joining GOSST, Mihai created the TensorFlow Security team after joining Google, moving from a startup to incorporate Differential... Read More →
avatar for Sarah Evans

Sarah Evans

Distinguished Engineer, Dell Technologies
Sarah is a security innovation researcher, leveraging diverse experiences as an IT and security practitioner to improve security by design in emerging technologies. Prior to Dell, Sarah has had roles at in the finance, defense, manufacturing and education industries. Sarah also contributes... Read More →
Thursday June 26, 2025 12:30pm - 12:45pm MDT
Bluebird Ballroom 3A

2:15pm MDT

SLSA Dependency Track Update - Meder Kydyraliev, Google & Adrian Diglio, Microsoft
Thursday June 26, 2025 2:15pm - 2:35pm MDT
A status update on the SLSA Dependency Track from the members of the working group. In the update we'll outline the objectives we are trying to achieve with the dependency track, highlight some of the challenges and the next steps.
Speakers
avatar for Meder Kydyraliev

Meder Kydyraliev

GOSST, Google
Meder is a lead on the Google Open Source Security Team where he drives initiatives to secure all aspects of the open source software supply chain, including secure dependency management practices, vulnerability management, artifact integrity and policy enforcement.
avatar for Adrian Diglio

Adrian Diglio

Secure Software Supply Chain, Microsoft
Adrian Diglio leads the Secure Software Supply Chain (S3C) team that secures Microsoft's end-to-end software supply chain. He leads Microsoft's SBOM efforts and published and contributed the Secure Supply Chain Consumption Framework (S2C2F) to the OpenSSF. He is an inventor, conference... Read More →
Thursday June 26, 2025 2:15pm - 2:35pm MDT
Bluebird Ballroom 3A

2:40pm MDT

The Open Source SDLC Control Plane: Building the Supply Chain Security Sandwich - Michael Lieberman, Kusari & Eman Abu Ishgair, Purdue
Thursday June 26, 2025 2:40pm - 2:50pm MDT
It seems like every day there’s a new security tool or best practice that emerges. At the same time developers are being asked to take on the burden of integrating all these tools and practices into their software development practices. These challenges mirror the problems developers and operators faced with the complexity of modern application operations that was eventually solved with technologies like kubernetes in the form of a container control plane. Come learn how a unified framework of software supply chain steps called AStRA can enable a new architecture in the form of a software development lifecycle (SDLC) control plane, to solve these problems and how building this might be simpler than you might think. OpenSSF has most of the pieces, they just need to be put together.
Speakers
avatar for Michael Lieberman

Michael Lieberman

CTO, Kusari
Michael Lieberman is co-founder and CTO of Kusari where he helps build transparency and security in the software supply chain. Michael is an active member of the open-source community, co-creating the GUAC and FRSCA projects and co-leading the CNCF’s Secure Software Factory Reference... Read More →
avatar for Eman Abu Ishgair

Eman Abu Ishgair

PhD Candidate in Electrical and Computer Engineering, Purdue
PhD candidate in ECE @ Purdue, working on software supply chain security
Thursday June 26, 2025 2:40pm - 2:50pm MDT
Bluebird Ballroom 3A

2:55pm MDT

Navigating Security in Generative AI Development - Katherine Druckman, Intel Corporation
Thursday June 26, 2025 2:55pm - 3:05pm MDT
As generative AI moves rapidly into production environments, developers face security challenges that traditional application security frameworks cannot fully address. This concise talk explores the fundamentals of AI security and compares how different communities—from security practitioners to AI researchers—are developing solutions through collaborative initiatives and open source communities and working groups.

Attendees will gain a clear understanding of how different communities, such as OpenSSF and OPEA and others, are addressing AI security challenges through complementary approaches, providing a foundation for implementing appropriate security controls in their own AI applications.

Topics Covered
* overview of AI security challenges vs traditional app sec
* Comparison of approaches from OpenSSF, OPEA Security Working Group, and other industry collaborations
Speakers
avatar for Katherine Druckman

Katherine Druckman

Open Source Evangelist, Intel Corporation
Katherine Druckman is an Open Source Evangelist at Intel, where she enjoys sharing her passion for a variety of open source topics. She currently combines her enthusiasm for software security and emerging AI technology as the OPEA Security Working Group Lead and Co-Chair of the OpenSSF... Read More →
Thursday June 26, 2025 2:55pm - 3:05pm MDT
Bluebird Ballroom 3A

3:10pm MDT

Harnessing In-toto Attestations for Security and Compliance With Next-gen Policies - Marcela Melara, Intel Labs & Trishank Kuppusamy, Datadog
Thursday June 26, 2025 3:10pm - 3:30pm MDT
U.S. executive orders 14028 and 14144 are driving greater adoption of supply chain security and transparency. The in-toto framework, a widely-deployed CNCF project, provides tools and data formats for generating and verifying authenticated supply chain metadata such as SBOMs and SLSA Build Provenance. in-toto plays a central role in enabling vendors to comply with regulations, but consumers and auditors still face challenges defining intuitive policies that allow them to derive meaning from existing attestations.

This session will present ongoing work on in-toto policies, where the community has been (re)defining policy specification and artifact verification for a rapidly evolving supply chain ecosystem. It starts with a brief introduction to the in-toto Attestation Framework, which is a standard way to describe supply chain data. This will be followed by sharing how the previous version of in-toto policies were unfortunately incompatible with new attestations formats. This concludes by demoing in-toto’s new policy framework that not only links attestations but also does so in more powerful, flexible, and user-friendly ways that accommodate a wide variety of real-world use cases.
Speakers
avatar for Marcela Melara

Marcela Melara

Research Scientist, Intel Labs
Marcela Melara is a research scientist in the Security and Privacy Research group at Intel Labs. Her current work focuses on developing solutions for high-integrity software and AI supply chains. She leads a number of internal, academic and open-source projects on supply chain and... Read More →
Thursday June 26, 2025 3:10pm - 3:30pm MDT
Bluebird Ballroom 3A

3:35pm MDT

Signing and Verifying Multi-architecture Containers With Sigstore - Natalie Somersall, Chainguard
Thursday June 26, 2025 3:35pm - 3:50pm MDT
Multi-architecture containers are magical to use—but a bit arcane to work with. Why does `docker pull python:3` grab only one architecture? How can we verify that the signed one is in use? In this talk, I’ll demystify how the order of operations for container resolution works. We’ll then dive into OCI manifests, image layers, tags, and how those map to annotations like SBOMs, attestations, and signatures. Using this info, we'll map out a couple strategies on generating and verifying this information with Cosign regardless of the architecture we need to use. I’ll walk through real-world weirdness I’ve helped folks through managing multi-arch images at scale, including how some registries and pull-through caches behave unexpectedly. This talk is for folks who use containers daily but want to lay the foundation for their software supply chain security.
Speakers
avatar for Natalie Somersall

Natalie Somersall

Principal Field Engineer, Public Sector, Chainguard
Natalie is a principal solutions engineer at Chainguard serving the public sector market. She spent years designing, building, and leading complex systems in regulated environments at a major systems integrator, but has also taken her career in many other directions - including detours... Read More →
Thursday June 26, 2025 3:35pm - 3:50pm MDT
Bluebird Ballroom 3A
 
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.