INTELLIGEnCE
DevOps, DevSecOps, MLOps and AI agent-driven technology continue to converge, demanding we all build and deliver on the promise of a new, cognitive enterprise. At the same time, the emergence of governance as a demand on development teams and the continuing enterprise demand for security – across traditional development and AI – is only expanding. How can your strategic choices in foundational platforms now serve as systems of record for the AI-powered software supply chain?
Join JFrog for this exclusive event, where we’ll partner with you to drive intelligent delivery forward!
agenda
09:00 AMThe Infinite Leap: Strategy Within Constant EvolutionTali Notman, CRO, JFrog
09:15 AMThe New Rules of Software TrustYoav Landman, CTO and Co-Founder, JFrog
Software is entering an agent-driven era. Autonomous AI agents no longer just assist developers; they write code, resolve dependencies, produce binaries, and trigger releases at machine speed. In this world, the binary, not the source code, becomes the true manifestation of software.
This shift breaks the traditional Software Supply Chain and exposes new risk surfaces. Governance models built for human workflows, pull requests, and periodic releases collapse when non-human actors produce software continuously and at exponential scale. This fundamentally challenges how enterprises establish trust in what agents – co-engineering with humans- produce.
This session explores how the Software Supply Chain must evolve to meet this transformation. The session focuses on enforcing trust, security, and auditability in agent-aware and agent-enabled software pipelines, and on how binaries become the system of record for autonomous agents.
10:00 AMSecure the Surge: Security & Governance Amidst the AI-Powered Version ExplosionEyal Dyment, VP, Security Product, JFrog
Ran Romano, VP of P&E, JFrog
Ran Romano, VP of P&E, JFrog
AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.
When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.
10:45 AMCOFFEE BREAK
AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.
When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.
11:00 AMCustomer Session
Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.
Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.
12:00 PMLUNCH BREAK
AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.
When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.
01:00 PMNoise-Canceling Headphones for Your Pipelines: Intelligent Prioritization at ScaleEyal Dyment, VP, Security Product, JFrog
Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.
Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.
01:45 PMYour Global Nervous System: Scaling for the Distributed Enterprise Yossi Shaul, SVP, DevOps Product, JFrog
02:30 PMClosing Session
Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.
Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.
02:45 PMBREAK
Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.
Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.
03:00 PMCustomer Meetings
Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.
Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.
Jfrog Speakers
Yossi Shaul
Eyal Dyment
Yoav Landman
Tali Notman
Ran Romano
Yoav Landman
Tali Notman
Ran Romano
Eyal Dyment
Yossi Shaul
SVP, DevOps Product