Why SCA Fails
Your SCA tools found 5,000 critical vulnerabilities. So why hasn't your product been breached? Most software supply chain security programs hit the same three walls: inflated risk scores, theoretical findings, and fixes that look simple but break things. In this video, I break down why finding vulnerabilities is the easy part, and why remediation is where programs stall. If you are a CISO or security leader at a product company trying to build a supply chain security program that actually works, this is for you. Next week I will cover the solutions. Links: Mission InfoSec: https://missioninfosec.com/ DevSecOps Pro Course: https://www.devsecopspro.com/ =============================== 🎥 Chapters 0:00 Intro 0:42 The Scope of the SCA Problem 1:39 Problem #1 - The Core Issue 2:35 Problem #2 - Many Risks are Theoretical 3:15 Why Reachability Analysis is Insufficient 4:16 Problem #3 - Fixing Vulnerabilities is Hard 5:29 Developer's Perspective 5:53 What Happens in Practice 6:16 The "No Remediation" Cycle 6:29 Recap 7:00 Diving Deeper ============================== About Chad Butler: I've spent 25 years building security programs at Amazon, AWS, SAP, and Disney. I'm the founder and CEO of Mission InfoSec and Lunir, where we help technical leaders build DevSecOps programs that keep up with AI adoption.
Download
0 formatsNo download links available.