Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
Tracebit logo with a circular purple emblem and lowercase text.

Detecting the Modern Supply Chain Attack: High-Fidelity Canaries for CI/CD and Beyond

Learn how high-fidelity canaries complement your detection strategy to catch the supply chain attacks that slip past conventional controls.

Live webinar

·

May 7, 11pm ET / 8am PT / 4pm BST

·

Zoom

Register for webinar
Nick Reva

Director of Security Engineering at DoorDash

Robert Thurtell

Director of Sales

Supply chain attacks are accelerating - and they're getting harder to detect. From compromised GitHub Actions workflows and poisoned npm packages to malicious CI/CD integrations, attackers are increasingly targeting the tools and pipelines your team trusts most. Traditional detection engineering struggles to keep pace with this evolving threat landscape. In this technical session, learn how high-fidelity canaries complement your existing controls to catch supply chain compromises before they become breaches.

Join Nick Reva, Director of Security Engineering at DoorDash, with 19 years of experience at high-engineering-bar companies including SpaceX and Snap. He'll be joined by Rob Thurtell from Tracebit for a hands-on exploration of threat-informed detection engineering, deception techniques, and a live demo of Tracebit Community Edition's GitHub Actions module.

You'll learn how to:

  • Understand how recent supply chain attacks exploit CI/CD pipelines, package registries, and developer tooling
  • See how high-fidelity canaries catch supply chain compromises that monitoring rules and SIEMs miss
  • Complement your existing detection controls with canary coverage across your software supply chain
  • Get started live with a demo of Tracebit Community Edition's GitHub Actions module

Who Should Attend:

  • Security leaders wanting to improve threat detection and post-breach capabilities
  • Security engineers and architects building detection engineering programs
  • Detection and response teams looking to improve signal fidelity and reduce alert fatigue
  • DevSecOps professionals responsible for supply chain security
Register for webinar
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings