Call for Speakers

in 3 months

SecureChainCon 2026

event date

25 Jun 2026

location

Online


Run Free, Run Safe: Defend Post-Deployment in the Age of AI

Software supply chain security is entering a new phase. Attackers are no longer limited to exploiting weaknesses discovered during development. They are targeting what’s already running in production, often within days of a vulnerability being disclosed. As AI accelerates both vulnerability discovery and weaponization, organizations must evolve from build-time scanning to continuous post-deployment defense.

SecureChainCon, hosted by the Continuous Delivery Foundation (CDF) and Ortelius open-source community, is a half-day free online event that brings together practitioners, security leaders, platform engineers, and open-source contributors working to close the gap between vulnerability detection and real-world exposure. The gathering focuses on post-deployment threat detection, improving post-deployment CVE visibility, and using automation and AI-assisted remediation workflows to reduce risk across live environments.

This is not another conference about scanning earlier in the pipeline; it’s about Continuous Threat Exposure Management (CTEM) and Remediation for what’s already deployed.


Why Attend SecureChainCon

Learn how AI is changing the vulnerability landscape

Understand how attackers are leveraging automation to weaponize CVEs faster, and what defenders must do differently to respond in production environments.

Make SBOMs actionable instead of archival

Discover how deployment-aware SBOM correlation enables teams to identify exactly where vulnerable components are running and prioritize remediation based on real exposure.

Adopt post-deployment vulnerability defense strategies

Explore emerging approaches, such as deploying digital twins that provide continuous visibility across applications, containers, services, and infrastructure.

Reduce alert fatigue and focus on what matters

See how endpoint-aware risk intelligence helps teams move from “scan everything” to fixing the vulnerabilities that actually impact running systems.

Understand how AI enables safer, faster remediation

Learn how AI-assisted dependency updates and workflow automation have the potential to improve how organizations shrink remediation timelines from months to days.

Connect with the open-source community building the next generation of supply chain security

Collaborate with engineers and security practitioners advancing practical solutions for runtime visibility, SBOM operations, and deployment intelligence.


Who Should Attend: 

  • Platform Engineers
  • DevOps Engineers
  • Full Stack Engineers
  • Application Developers
  • Security Engineers and CISO Teams
  • Project Management




open, 46 days left
Call for Speakers
Call opens at 12:00 AM

06 Apr 2026

Call closes at 11:59 PM

25 May 2026

Call closes in Mountain Daylight Time (UTC-06:00) timezone.
Closing time in your timezone () is .

SecureChainCon 2026 - Run Free, Run Safe: Defend Post-Deployment in the Age of AI

Software supply chain security is evolving rapidly. Attackers are no longer waiting for weaknesses to appear during development; they are targeting what’s already running in production, often within days of disclosure. At the same time, AI is accelerating software development and the adoption of open-source software, expanding the attack surface, while hackers are using AI to speed up the time to attack.

SecureChainCon, hosted by the Ortelius open-source community, is a free half-day virtual conference focused on post-deployment threat detection, Continuous Threat Exposure Management (CTEM), deployment visibility, and AI-assisted remediation workflows.

We are seeking speakers who want to help teams move beyond build-time scanning toward continuous defense of deployed systems. If you’re working on the next generation of runtime-aware security, SBOM operations, deployment intelligence, or AI-driven remediation, we want to hear from you.


Suggested Topics:


We welcome technical talks, practitioner case studies, architecture deep dives, research insights, and open-source demonstrations in areas including:


  • Demos for Ortelius V.12
  • Resources and Tooling for Post Deployment Vulnerability Detection/Remediation
  • Sense, Reason, Act AI Models for Vulnerability Management
  • Continuous Threat Exposure Management
  • Meeting CRA and CISA vulnerability response requirements


Speaking at SecureChainCon gives you the opportunity to:


Speaking at SecureChainCon gives you the opportunity to share innovations shaping the future of post-deployment vulnerability defense while influencing emerging practices around Continuous Threat Exposure Management (CTEM). You’ll help define how AI is transforming remediation workflows and connect with platform engineers and security practitioners working to solve real exposure problems in production environments. Presenters also contribute to the growing movement toward continuous runtime visibility across the software supply chain and engage directly with the Ortelius open-source security community, advancing the next generation of deployment intelligence and software supply chain defense.

Talk Formats


  • 20-minute technical talks
  • 10-minute lightning talks

Vendor product pitches without technical depth are discouraged. Practitioner experience and architecture insight are strongly preferred.

Who Should Submit

  • Platform Engineers
  • DevOps Engineers
  • Security Engineers
  • Application Developers
  • Open-source maintainers
  • Researchers
  • CISO-level practitioners
  • Software supply chain security leaders



Submission Guidance:

Both experienced speakers and first-time presenters are welcome.  Strong proposals typically include:

  • A clearly defined post-deployment security problem
  • A practical solution or architecture pattern
  • Lessons learned from real environments
  • Open standards or community alignment where possible
  • Actionable takeaways for attendees
  • Help Shape the Future of Supply Chain Defense

SecureChainCon is not about shifting security earlier in the pipeline. It’s about defending what’s already deployed. If you are building solutions for runtime visibility, SBOM intelligence, AI-assisted remediation, or deployment-aware vulnerability prioritization, we invite you to share your work with the community.


all submitted sessions

publicly listed on this page

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.

0 submissions
Submitted sessions

No submissions yet.