Traditional software supply chain tools focus on verifying the integrity of code and binaries—but they often overlook the human element behind those changes.
Identity and Access Management (IAM) and Identity Governance and Administration (IGA) fill this critical gap by introducing dynamic, context-aware trust into the development and deployment lifecycle.
In this session, we’ll explore how adding identity intelligence to your software supply chain provides deeper visibility and accountability. For example, when a vulnerable dependency is introduced, IGA allows you to trace it back to the individual who made the change, understand their role, and assess whether their access was appropriate.
Key Takeaways:
REGISTER NOW: Attend live to receive an attendance certificate to be used towards CPE credits.