|
| 1 | +--- |
| 2 | +title: Resources |
| 3 | +--- |
| 4 | + |
| 5 | +Whether you're just getting started with supply chain security or looking to deepen your understanding of policy enforcement in container workflows, these resources provide valuable insights from industry experts and real-world implementations. |
| 6 | + |
| 7 | +These conference presentations, demos, and educational videos showcase how organizations are using Conforma to secure their software supply chains. |
| 8 | + |
| 9 | +## Enforcing Organization Policies with Enterprise Contract |
| 10 | + |
| 11 | +**Speaker:** Zoran Regvart, Red Hat |
| 12 | +**Event:** SOSS Community Day Europe 2024 |
| 13 | +**Format:** Conference Talk with Live Demo |
| 14 | +**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=OmnF_Bm4KOU) |
| 15 | + |
| 16 | +{{< rawhtml >}} |
| 17 | +<br> |
| 18 | +<iframe width="560" height="315" src="https://www.youtube.com/embed/OmnF_Bm4KOU" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe> |
| 19 | +<br> |
| 20 | +{{< /rawhtml >}} |
| 21 | + |
| 22 | +This talk explores how Conforma leverages Sigstore signatures, in-toto attestations, and other tamper-proof sources to enforce organizational policies. The presentation focuses on the Tekton ecosystem and covers: |
| 23 | + |
| 24 | +- The critical importance of ensuring container images meet organizational policies |
| 25 | +- How Conforma enforces policies using secure, tamper-proof sources |
| 26 | +- Configuring policies to validate that specific Tekton Tasks (like code scanners) have been executed during the container image build process |
| 27 | + |
| 28 | +*Perfect for those familiar with Sigstore who want to understand how to go beyond simple signature checks to comprehensive image validation.* |
| 29 | + |
| 30 | +## Policy-Driven Supply Chain Security with Conforma |
| 31 | + |
| 32 | +**Speaker:** Mark Bestavros, Red Hat |
| 33 | +**Event:** DevConf.US 2024 |
| 34 | +**Format:** Conference Talk with Live Demo |
| 35 | +**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=JgXXAjRuHfo) |
| 36 | + |
| 37 | +{{< rawhtml >}} |
| 38 | +<br> |
| 39 | +<iframe width="560" height="315" src="https://www.youtube.com/embed/JgXXAjRuHfo" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe> |
| 40 | +<br> |
| 41 | +{{< /rawhtml >}} |
| 42 | + |
| 43 | +This talk demonstrates how Conforma serves as a decision engine for enforcing provenance, regulatory compliance, and security requirements. Key highlights include: |
| 44 | + |
| 45 | +- User-friendly policy configuration and requirements definition |
| 46 | +- Image signature verification and attestation validation |
| 47 | +- CVE alert checking and security compliance |
| 48 | +- Integration with Open Policy Agent's Rego rule system for extensible policy evaluation |
| 49 | + |
| 50 | +The session includes a live demonstration of building an image, verifying it using the conforma CLI, and customizing enforcement policies. |
| 51 | + |
| 52 | +## Building Trust Through Proactive Security |
| 53 | + |
| 54 | +**Speakers:** Przemyslaw Roguski & Ralph Bean, Red Hat |
| 55 | +**Event:** Open Source Summit North America 2025 |
| 56 | +**Format:** Conference Talk with Live Demo |
| 57 | +**Link:** [Talk Details](https://ossna2025.sched.com/event/1zfp2/building-trust-through-proactive-security-key-parts-of-the-trusted-software-supply-chain-przemyslaw-roguski-ralph-bean-red-hat) |
| 58 | + |
| 59 | +{{< rawhtml >}} |
| 60 | +<br> |
| 61 | +<iframe width="560" height="315" src="https://www.youtube.com/embed/CzWuBeWQDb8" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe> |
| 62 | +<br> |
| 63 | +{{< /rawhtml >}} |
| 64 | + |
| 65 | +This comprehensive session covers Red Hat's Secure Software Development Lifecycle (SDLC) framework and includes: |
| 66 | + |
| 67 | +- Proactive vs. reactive security measures |
| 68 | +- SDLC objectives and implementation strategies |
| 69 | +- Automated testing and open-source SDLC solutions |
| 70 | +- Proactive vulnerability management during build phases |
| 71 | +- Secure software building with attestation data production (CSAF/VEX and SBOM) |
| 72 | +- Future of AI testing in supply chain security |
| 73 | + |
| 74 | +*Features Ralph's hands-on demonstration showing how conforma works within Konflux in practice.* |
| 75 | + |
| 76 | +## Achieving Simplicity and Security with Konflux |
| 77 | + |
| 78 | +**Speaker:** Dheeraj Singh Jodha, Red Hat |
| 79 | +**Event:** TechGenie Pune 2024 |
| 80 | +**Format:** Virtual Presentation |
| 81 | +**Link:** [Watch on YouTube](https://www.youtube.com/watch?v=sR8U5-UPGQs) |
| 82 | + |
| 83 | +{{< rawhtml >}} |
| 84 | +<br> |
| 85 | +<iframe width="560" height="315" src="https://www.youtube.com/embed/sR8U5-UPGQs" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe> |
| 86 | +<br> |
| 87 | +{{< /rawhtml >}} |
| 88 | + |
| 89 | +This presentation showcases how Konflux integrates with Conforma to provide both simplicity and security in software development workflows. Key highlights include: |
| 90 | + |
| 91 | +- Overview of modern supply chain threats in open-source software |
| 92 | +- Introduction to Konflux for secure and automated CI |
| 93 | +- Demo: onboarding, testing, vulnerability scanning, and custom policy-based gating (via Conforma) |
| 94 | +- Empowering teams to shift left on security through policy-driven pipelines |
0 commit comments