Call for Speakers

in 32 days

SecureChainCon 2026

event date

25 Jun 2026

location

Online


Run Free, Run Safe: Defend Post-Deployment in the Age of AI

Software supply chain security is entering a new phase. Attackers are no longer limited to exploiting weaknesses discovered during development. They are targeting what’s already running in production, often within days of a vulnerability being disclosed. As AI accelerates both vulnerability discovery and weaponization, organizations must evolve from build-time scanning to continuous post-deployment defense.

SecureChainCon, hosted by the Continuous Delivery Foundation (CDF) and Ortelius open-source community, is a half-day free online event that brings together practitioners, security leaders, platform engineers, and open-source contributors working to close the gap between vulnerability detection and real-world exposure. The gathering focuses on post-deployment threat detection, improving post-deployment CVE visibility, and using automation and AI-assisted remediation workflows to reduce risk across live environments.

This is not another conference about scanning earlier in the pipeline; it’s about Continuous Threat Exposure Management (CTEM) and Remediation for what’s already deployed.


Why Attend SecureChainCon

Learn how AI is changing the vulnerability landscape

Understand how attackers are leveraging automation to weaponize CVEs faster, and what defenders must do differently to respond in production environments.

Make SBOMs actionable instead of archival

Discover how deployment-aware SBOM correlation enables teams to identify exactly where vulnerable components are running and prioritize remediation based on real exposure.

Adopt post-deployment vulnerability defense strategies

Explore emerging approaches, such as deploying digital twins that provide continuous visibility across applications, containers, services, and infrastructure.

Reduce alert fatigue and focus on what matters

See how endpoint-aware risk intelligence helps teams move from “scan everything” to fixing the vulnerabilities that actually impact running systems.

Understand how AI enables safer, faster remediation

Learn how AI-assisted dependency updates and workflow automation have the potential to improve how organizations shrink remediation timelines from months to days.

Connect with the open-source community building the next generation of supply chain security

Collaborate with engineers and security practitioners advancing practical solutions for runtime visibility, SBOM operations, and deployment intelligence.


Who Should Attend: 

  • Platform Engineers
  • DevOps Engineers
  • Full Stack Engineers
  • Application Developers
  • Security Engineers and CISO Teams
  • Project Management




open, 2 days left
Call for Speakers
Call opens at 12:00 AM

06 Apr 2026

Call closes at 11:59 PM

25 May 2026

Call closes in Mountain Daylight Time (UTC-06:00) timezone.
Closing time in your timezone () is .

SecureChainCon 2026 - Run Free, Run Safe: Defend Post-Deployment in the Age of AI

Software supply chain security is evolving rapidly. Attackers are no longer waiting for weaknesses to appear during development; they are targeting what’s already running in production, often within days of disclosure. At the same time, AI is accelerating software development and the adoption of open-source software, expanding the attack surface, while hackers are using AI to speed up the time to attack.

SecureChainCon, hosted by the Ortelius open-source community, is a free half-day virtual conference focused on post-deployment threat detection, Continuous Threat Exposure Management (CTEM), deployment visibility, and AI-assisted remediation workflows.

We are seeking speakers who want to help teams move beyond build-time scanning toward continuous defense of deployed systems. If you’re working on the next generation of runtime-aware security, SBOM operations, deployment intelligence, or AI-driven remediation, we want to hear from you.


Suggested Topics:


We welcome technical talks, practitioner case studies, architecture deep dives, research insights, and open-source demonstrations in areas including:


  • Demos for Ortelius V.12
  • Resources and Tooling for Post Deployment Vulnerability Detection/Remediation
  • Sense, Reason, Act AI Models for Vulnerability Management
  • Continuous Threat Exposure Management
  • Meeting CRA and CISA vulnerability response requirements


Speaking at SecureChainCon gives you the opportunity to:


Speaking at SecureChainCon gives you the opportunity to share innovations shaping the future of post-deployment vulnerability defense while influencing emerging practices around Continuous Threat Exposure Management (CTEM). You’ll help define how AI is transforming remediation workflows and connect with platform engineers and security practitioners working to solve real exposure problems in production environments. Presenters also contribute to the growing movement toward continuous runtime visibility across the software supply chain and engage directly with the Ortelius open-source security community, advancing the next generation of deployment intelligence and software supply chain defense.

Talk Formats


  • 20-minute technical talks
  • 10-minute lightning talks

Vendor product pitches without technical depth are discouraged. Practitioner experience and architecture insight are strongly preferred.

Who Should Submit

  • Platform Engineers
  • DevOps Engineers
  • Security Engineers
  • Application Developers
  • Open-source maintainers
  • Researchers
  • CISO-level practitioners
  • Software supply chain security leaders



Submission Guidance:

Both experienced speakers and first-time presenters are welcome.  Strong proposals typically include:

  • A clearly defined post-deployment security problem
  • A practical solution or architecture pattern
  • Lessons learned from real environments
  • Open standards or community alignment where possible
  • Actionable takeaways for attendees
  • Help Shape the Future of Supply Chain Defense

SecureChainCon is not about shifting security earlier in the pipeline. It’s about defending what’s already deployed. If you are building solutions for runtime visibility, SBOM intelligence, AI-assisted remediation, or deployment-aware vulnerability prioritization, we invite you to share your work with the community.


all submitted sessions

publicly listed on this page

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.

108 submissions
Submitted sessions
Lingareddy
  • Secure GenAI Data Pipelines for Enterprise Decision-Making
Prem Kumar
  • AI-Driven ETL for Secure, Scalable Business Intelligence
  • Cost Optimization for Cloud BI Workloads
Srikanth Gadde
  • Securing AI-Driven Transformation: Governance, Risk, and Strategy Across HR and Finance
Kavya
  • Precision by Design: Layout Strategies for Reliable High-Speed and Mixed-Signal Systems
  • Beyond DRC: Context-Aware Layout Verification for Robust Analog Silicon
Janardhana Naidu
  • Securing Healthcare Benefits Intelligence for Enterprise Risk Strategy
  • AI-Driven Predictive Risk Intelligence for the Enterprise
Sujoy
  • Declarative Orchestration for Secure Multi-Tenant Cloud Workflows
  • Trustworthy Real-Time Compliance Orchestration in Financial Services
Navaneeth
  • Continuous Threat Exposure Management for Generative AI Supply Chains
  • Post Deployment Kubernetes Defense for AI Driven Enterprise Platforms
Aakash Abhay Yadav
  • Portcullis: Runtime Enforcement for AI Agent Tool Calls.
Reeshav Kumar
  • Beyond Bigger Models: Multi-Axis Scaling for Secure Enterprise AI
Maverick
  • One Container, Five Clouds: A Production Pattern for AI Workloads with KMS-Backed Secrets and Cost
  • Runtime Contracts for AI Agents: Deterministic Enforcement of OWASP-Aligned Controls
show all submissions
Bhabindra
  • Driving Secure Decision Intelligence with Enterprise Data Lakes and Digital Dashboards
  • Scaling Agile in Regulated Global Enterprises
Mohanraj Varatharaj
  • Building Secure Real-Time Decision Systems with AI and Enterprise Analytics
Kedarnath
  • AI-Driven Risk Mitigation for Secure ACH and Virtual Card Payment Ecosystems
  • AI-Driven Identity Verification and Fraud Risk Intelligence for Financial Services
Siddharth Jain
  • Sense, Reason, Act Safely: Runtime Controls for Enterprise AI Agents
Deepak
  • Securing AI-Driven ERP with Oracle Fusion Cloud
  • Secure AI Extensions for Oracle Fusion SCM
Srinivasarao Challagundla
  • Secure Enterprise Automation in Robotics and Financial Systems
Avdesh Mishra
  • Preparing Enterprise IAM for the Quantum Security Transition
  • Securing AI-Driven Enterprises with a Risk-Adaptive Security Framework
  • Cybersecurity by Design for M&A, Divestitures, and Business Carve-Outs
Pramod Baddam
  • AI-Driven Distributed Systems for Scalable Telecom Network Optimization
Akhil Anand Gore
  • Reusable System-Level ESD Verification for 2.5D and 3D ICs
  • Scalable Static ESD Verification for Reticle-Scale SoCs
Arunkumar Muthuramalingam
  • Cybersecurity as a Societal Pillar: AI, Trust, and Digital Resilience
Dasaradhi Eddula
  • Sustainable Platform Engineering for Secure, Resilient Financial Systems
Nishant Verma
  • Democratizing AI for SMBs: Secure Intelligent Supply Chains at Scale
Pavankumar
  • LLM-Assisted Generation of Governed Enterprise ETL/ELT Pipelines
  • Intelligent Data Lineage and Impact Analysis for Secure Enterprise Intelligence Systems
Himanshu Pandey
  • Schema-Driven Interfaces for AI Agent Protocols: Building Predictable, Compliant Human-AI Workflows
  • Self-Healing Cloud Infrastructure Through API-Level Containment and ML-Driven Threat Detection
Parikshit Dineshbhai
  • Privacy-Preserving AI for Secure and Compliant Model Training
  • Securing LLMs Against Data Leakage and Sensitive Information Extraction
Madhusudhan
  • Engineering Leadership for Secure, Regulated Systems
Rohit Sharma
  • Securing Scalable Cloud UI Applications in Modern Runtime Environments
Anay Paul
  • AI-Powered Code Authoring in Visual Studio with Enterprise LLM Workflows
  • DevMate: Agentic LLM Workflows for AOSP at Scale
Srikanth Devarakonda
  • Beyond Benchmarks: Evaluating Generative AI for Real-World Impact
Venkateswarlu Gajjela
  • Building Resilient Financial Systems with Cloud-Native AI Architectures
Venkat Ravi Gelle
  • Cross-Cloud Generative AI for AML, KYC, and Fraud Detection
Bramhanand
  • Securing Enterprise Data Architecture with NoSQL
  • From Transactions to Trust: Secure, Real-Time Data Distribution for Enterprise Impact
Sree Priyanka Uppu
  • Securing Live Streaming at Scale: CDN Architecture for Massive Events
Praveen Kumar Alam
  • Immutability for Secure, Scalable, and Predictable Systems
Naveen Kumar Pedada
  • Secure Real-Time Streaming for Clinical Decision Support
Rajender Chilukala
  • AI-Driven Banking: Cloud-Native Security & Real-Time Fraud Detection
  • AI-Driven Fraud Detection in Cloud Banking: Adaptive Security Systems
Pavan Kumar Reddy Boppidi
  • TRAIL-Guard: Governance-Calibrated Readiness for Agentic AI in Logistics
  • Governed Human–AI Collaboration for Autonomous Logistics in Industry 5.0
Aditya
  • Secure Event-Driven Salesforce at Enterprise Scale
  • Governance-First AI Agents: Securely Deploying Autonomous Intelligence in Enterprise CRM Systems
Zubairuddin
  • AI-Driven Post-Deployment Defense with Prisma Cloud for Continuous Threat Exposure Management
  • AI-Driven Post-Deployment Cloud Defense with Prisma Cloud for Runtime Threat Exposure
Srinivas Ankam
  • AI-Native Retail Supply Chains: Transforming Future Work Through Intelligent Logistics
Harshit Vora
  • AI-Driven Accessibility & Performance Auditing with Human Oversight
Venkata Raghavendra Vaishnav Vinjamuri
  • Human-AI Collaboration for Secure FWA Operations and Network Resilience
Shyamala Bai
  • Predictive Avionics Certification: AI-Driven DO-178C Compliance
Ashish Kalra
  • Performance Pitfalls in AMD SEV-SNP: Debugging Confidential VM Stacks
Muthu Ramachandran Saravanan
  • Intentional Product Delivery in AI: A Framework for Trust & Security
Prashant Mavani
  • Secure ISA-88 Automation for SMCC and Buffer Systems in Bioprocessing
Manish Singh
  • Adaptive Rule-Driven Data Quality for Trusted Telemetry Systems
Suchir
  • Reusing Linux Drivers for Bare-Metal Validation with SystemVerilog DPI-C
  • Real-Device-Driven USB Host Verification Using a Virtualized Hardware-in-the-Loop Modeling Framework
Vivek
  • Privacy-Preserving Competitive Intelligence for Digital Platforms
Venkata Sambasiva Rao
  • AI-Driven Healthcare Fraud Detection: Implementing FAMS for Smarter Claims Oversight
Swami venkatesh Mandepu
  • Automated PLM for Secure Digital Twin Acceleration in Hardware
Dinesh Reddy Kasu
  • Graph-Driven Intent Modeling for Secure Enterprise Conversational AI
Rohit Wadhwa
  • Predictive Workflow Integrity for Secure, Resilient Event-Driven Systems
Swamy Biru
  • AI-Driven Decision Support for Secure and Scalable Banking Advisory Systems
  • AI-Driven Middle Office Security and Post-Deployment Risk Management
Shubhapriya Muthuramalingam
  • Digitizing Clinical Guidelines: A Secure FHIR Maturity Model
Ravi Chandra Chodisetti
  • Closing the Semantic Gap: Secure Ontology Learning for Analytics Agents
Venkateswara Rao Banda
  • Secure Enterprise Support with Salesforce Agentforce and Einstein AI
  • Secure Predictive Service Intelligence with Salesforce Einstein AI
Anandan Sonaimuthu
  • Incremental Legacy Modernization: Secure, Governed Transformation Framework
Uday Kumar Soma
  • Securing Network Ops with AI: LLM Automation & Intelligent Observability
Nagaraju Vedicherla
  • AI in Healthcare Claims: Secure, Accurate, and Fraud-Resilient Processing
Prudhvi
  • Cryptographic Trust Chains for Secure CI CD Pipelines in Distributed Systems
Balasubramanian Jagannathan
  • AI-Driven Post-Deployment Failure Loop Defense for Secure and Resilient Distributed Systems
Shatrughna Upadhyay
  • Reliable Payment Processing: Retries & Idempotency in Distributed Systems
Arjun Vijay
  • Secure Human Cloud Integration for Intelligent and Resilient Supply Chains
  • Secure Cloud Native Supply Chains for Real Time Intelligence and Resilience
Sharath Chandra Thurupati
  • Passwords to Passkeys: YubiKey vs Passkeys in Security & Usability
Karan Jain
  • User-centric HMI design and its measurable impact on system reliability
  • Multimodal sensing for reliable robotic perception in real-world systems
Selvam
  • Electromagnetic Compatibility in Aircraft: A System Integration Discipline
Ankur
  • Securing Agentic AI at the Boundary: Privacy-Safe Tool Calling for LLMs in Confidential Environments
Romal Bharatkumar
  • From Workflow Systems to Governance Infrastructure: Designing Compliance-Critical Case Processing Ar
  • Trust by Design: Deterministic Integrity for Governance-Critical Case Processing Infrastructure
Lakshmi Srinivasarao
  • From Failure to Resilience: Deploying Self-Healing Data Pipelines with Generative AI in Production
Santhosh
  • AI as Your SRE: Real-Time Root Cause Analysis in Complex Distributed Systems
Manoj Murali
  • Hardware in the Age of AI: Why Secure Silicon Still Matters
  • Precision Clock Uncertainty Modeling for Power-Efficient SoCs
Bala Thripura
  • Securing Agentic AI: Threat Modeling & Testing for AI Supply Chains
  • Shift-Left Security for AI Code: Reducing Risk in the Supply Chain
Gaurav
  • From Bots to Control Rooms: Governing Enterprise Automation at Scale
Vanessa
  • Strengthen AI cyber resilience for your Microsoft cloud data
Bodhisattva Das
  • Who Gave the Agent Admin Rights?! Securing AI Agent Identities in Production
Rogue
  • Contextual SBOMs: Unlocking Precise Vulnerability Management with Build-Time Content Intelligence
Janane Suresh
  • Beyond the Birth Certificate: Architecting Deployment-Aware SBOMs for Real-Time Defense
Fahed Dorgaa
  • Post-Deployment CVE Triage with LLMs: Cutting Scanner Noise with Runtime Context