OSCAL in Action: Real World Examples of Automating Policy & Comp... Jennifer Power & Hannah Braswell

Presenters Jennifer Power Hannah Braswell Source OpenSource SecurityCon NA 2025 From Paperwork Nightmare to Automated Compliance: Unlocking Security with OSCAL 🚀 Tired of drowning in compliance documentation? Feeling the pain of manual checks and fragmented data that make maintaining a strong security posture feel like an impossible mission? You’re not alone! Jen Power and Hannah Braswell from Red Hat recently took the stage to unveil a revolutionary approach to policy and compliance automation, and it’s all powered by OSCAL. Get ready to ditch the spreadsheets and embrace a future of traceable, automated security. ✨ ...

November 24, 2025 · 6 min

Sponsored Keynote: Breaking Up with Long-lived Secrets: Secure Automation in the Mode... Billy Lynch

Presenters Billy Lynch Source OpenSource SecurityCon NA 2025 Long Live Secrets? Let’s Talk Short-Lived Credentials for a More Secure Software Supply Chain! 🚀 Hey tech enthusiasts! Ever felt like managing secrets in your software supply chain is a bit like juggling chainsaws? You want to keep things secure, but sometimes the established practices feel… well, a little less than ideal. That’s exactly the sentiment Billy Lynch, a Software Engineer at Chainbound, shared at a recent tech conference, and it’s a topic that deserves our attention. ...

November 24, 2025 · 4 min

You Can Sign It, But Can You Trust It? Securing the Compilation Process - Yaxuan(Alice) Wen

Presenters Yaxuan(Alice) Wen Source OpenSource SecurityCon NA 2025 Securing the Build: How to Protect Your Software’s Foundation 🛠️ Hey tech enthusiasts! Ever stopped to think about what happens before your favorite software hits your desktop or phone? The journey from source code to a polished application is a complex one, and a critical, yet often overlooked, stage is compilation. Today, we’re diving deep into why this stage is a prime target for attackers and how we can fortify it, thanks to some groundbreaking research presented at a recent tech conference. ...

November 24, 2025 · 6 min

Lightning Talk: Where Should Source Attestations Live? Exploring Storage Strategies - Billy Lynch

Presenters Billy Lynch Source OpenSource SecurityCon NA 2025 Where Do Your Source Attestations Live? Navigating the Labyrinth of Metadata 🗺️ Hey tech enthusiasts! Ever felt like you’re drowning in a sea of metadata, wondering where exactly to stash those crucial source attestations? You’re not alone! At a recent lightning talk, Billy Lynch from Chain Guard dove deep into this very question, exploring strategies for storing and discovering these vital pieces of information. Let’s break down the key takeaways and ponder the future of source attestation storage. 💡 ...

November 24, 2025 · 5 min

Multi-messenger Security: Adaptive Kubernetes SOC... Constanze Roedig, Ben Hirschberg & Dom Delnano

Presenters Constanze Roedig Ben Hirschberg Dom Delnano Source OpenSource SecurityCon NA 2025 Beyond the Buzzwords: Unveiling an Adaptive eBPF Security Powerhouse for Real-World Threats 🚀 In the ever-evolving landscape of cybersecurity, staying ahead of sophisticated threats often feels like chasing a phantom. Traditional security operations centers (SOCs), while essential, can often buckle under the weight of performance overhead, overwhelming data volumes, and the persistent challenge of truly fast and accurate detection. But what if there was a way to fuse the power of observability with the precision of security, creating an adaptive defense system that learns and evolves with the threats it faces? ...

November 24, 2025 · 6 min