
Speakers
Speakers
Schedule
Want to stay in the loop?
Sign up for our newsletter.
Start your day or refuel midday with a fresh perspective on AI, AppSec, and software supply chain security. Whether you’re craving tactical insights or cosmic metaphors, these suite sessions serve up a mix of expert guidance, real-world use cases, and a few surprises along the way.
August 6, 12:00 - 2:00 pm
Speaker: Dr. Jasyn Voshell | Sr. Director Product and Solutions Security | Zebra Technologies Corporation
Join us for a lunch-and-learn journey to a galaxy not-so-far-away—where developers are becoming Jedi Masters of secure coding. Discover how Zebra Technologies is using Endor Labs to eliminate vulnerable dependencies, reduce tech debt, and empower devs with security superpowers. May the source be with you.
August 7, 9:00 - 11:00 am
Speakers: Aman Sirohi | CSO | People.ai & Jeremiah Kung | Global Head of Information Security | AppLovin
Aman Sirohi and Jeremiah Kung break down how AppSec must evolve in the era of AI. From improving developer experience to securing LLM workflows, this session offers a crawl-walk-run playbook for modernizing security in AI-powered environments.
August 7, 12:00 - 2:00 pm
Speaker: Cassie Crossley | VP, Supply Chain Security, Cybersecurity & Product Security Office | Schneider Electric
Author and expert Cassie Crossley explores how the rise of AI is reshaping software supply chain risk. Learn how concepts like the AI Bill of Materials (AIBOM) and model governance are redefining secure development lifecycles for the next generation of builders.
Sign up for our newsletter.
This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.
Click to read
This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.
Click to read
This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.
Click to read
Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.
Click to read
The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.
Click to read
Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.
Click to read
This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.
Click to read
Lightsaber Stunt Training Series - Europe
Click to view
Innovate Cybersecurity Summit - Nashville
Click to view
Innovate Cybersecurity Summit, Scottsdale
Click to view