Run Free, Run Safe: Defend Post-Deployment in the Age of AI
Software supply chain security is entering a new phase. Attackers are no longer limited to exploiting weaknesses discovered during development. They are targeting what’s already running in production, often within days of a vulnerability being disclosed. As AI accelerates both vulnerability discovery and weaponization, organizations must evolve from build-time scanning to continuous post-deployment defense.
SecureChainCon, hosted by the Continuous Delivery Foundation (CDF) and Ortelius open-source community, is a half-day free online event that brings together practitioners, security leaders, platform engineers, and open-source contributors working to close the gap between vulnerability detection and real-world exposure. The gathering focuses on post-deployment threat detection, improving post-deployment CVE visibility, and using automation and AI-assisted remediation workflows to reduce risk across live environments.
This is not another conference about scanning earlier in the pipeline; it’s about Continuous Threat Exposure Management (CTEM) and Remediation for what’s already deployed.
Why Attend SecureChainCon
Learn how AI is changing the vulnerability landscape
Understand how attackers are leveraging automation to weaponize CVEs faster, and what defenders must do differently to respond in production environments.
Make SBOMs actionable instead of archival
Discover how deployment-aware SBOM correlation enables teams to identify exactly where vulnerable components are running and prioritize remediation based on real exposure.
Adopt post-deployment vulnerability defense strategies
Explore emerging approaches, such as deploying digital twins that provide continuous visibility across applications, containers, services, and infrastructure.
Reduce alert fatigue and focus on what matters
See how endpoint-aware risk intelligence helps teams move from “scan everything” to fixing the vulnerabilities that actually impact running systems.
Understand how AI enables safer, faster remediation
Learn how AI-assisted dependency updates and workflow automation have the potential to improve how organizations shrink remediation timelines from months to days.
Connect with the open-source community building the next generation of supply chain security
Collaborate with engineers and security practitioners advancing practical solutions for runtime visibility, SBOM operations, and deployment intelligence.
Who Should Attend:
SecureChainCon 2026 - Run Free, Run Safe: Defend Post-Deployment in the Age of AI
Software supply chain security is evolving rapidly. Attackers are no longer waiting for weaknesses to appear during development; they are targeting what’s already running in production, often within days of disclosure. At the same time, AI is accelerating software development and the adoption of open-source software, expanding the attack surface, while hackers are using AI to speed up the time to attack.
SecureChainCon, hosted by the Ortelius open-source community, is a free half-day virtual conference focused on post-deployment threat detection, Continuous Threat Exposure Management (CTEM), deployment visibility, and AI-assisted remediation workflows.
We are seeking speakers who want to help teams move beyond build-time scanning toward continuous defense of deployed systems. If you’re working on the next generation of runtime-aware security, SBOM operations, deployment intelligence, or AI-driven remediation, we want to hear from you.
Suggested Topics:
We welcome technical talks, practitioner case studies, architecture deep dives, research insights, and open-source demonstrations in areas including:
Speaking at SecureChainCon gives you the opportunity to:
Speaking at SecureChainCon gives you the opportunity to share innovations shaping the future of post-deployment vulnerability defense while influencing emerging practices around Continuous Threat Exposure Management (CTEM). You’ll help define how AI is transforming remediation workflows and connect with platform engineers and security practitioners working to solve real exposure problems in production environments. Presenters also contribute to the growing movement toward continuous runtime visibility across the software supply chain and engage directly with the Ortelius open-source security community, advancing the next generation of deployment intelligence and software supply chain defense.
Talk Formats
Vendor product pitches without technical depth are discouraged. Practitioner experience and architecture insight are strongly preferred.
Who Should Submit
Submission Guidance:
Both experienced speakers and first-time presenters are welcome. Strong proposals typically include:
SecureChainCon is not about shifting security earlier in the pipeline. It’s about defending what’s already deployed. If you are building solutions for runtime visibility, SBOM intelligence, AI-assisted remediation, or deployment-aware vulnerability prioritization, we invite you to share your work with the community.
If you haven't logged in before, you'll be able to register.
Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.
No submissions yet.