INTELLIGEnCE

Frankfurt

May 12th – 13th

SECURE. GOVERN. DELIVER

Powering the AI-driven software supply chain with trust

MAY 12TH //
6:00 PM - 9:00 PM

GATHERING & GALA DINNER

Sofitel Frankfurt Opera

Inma Martinez

Leadership and Challenges in the Age of AI

Inma Martinez is a powerhouse on the global AI stage who moves beyond the typical “tech futurist” label by balancing deep technical foresight with genuine, experienced business value. While many experts get caught up in the “how,” Inma focuses on the “why” and the “what’s next.” She specializes in translating complex digital shifts into actionable strategies that help organizations build a competitive edge while navigating the big-picture realities of global government policy and industrial strategy. In a world of shifting regulations, her unique insights into AI sovereignty are invaluable for anyone building at scale. Join Inma to not just talk about the AI-powered future; help define the roadmap for how we’ll actually live and work in it.

MAY 13TH //
9:00 AM - 5:00 PM

Leap agenda

AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.

When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.

Software is entering an agent-driven era. Autonomous AI agents no longer just assist developers; they write code, resolve dependencies, produce binaries, and trigger releases at machine speed. In this world, the binary, not the source code, becomes the true manifestation of software.

This shift breaks the traditional Software Supply Chain and exposes new risk surfaces. Governance models built for human workflows, pull requests, and periodic releases collapse when non-human actors produce software continuously and at exponential scale. This fundamentally challenges how enterprises establish trust in what agents – co-engineering with humans- produce.

This session explores how the Software Supply Chain must evolve to meet this transformation. The session focuses on enforcing trust, security, and auditability in agent-aware and agent-enabled software pipelines, and on how binaries become the system of record for autonomous agents.

AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.

When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.

Let’s face it: developers can feel like the extreme velocity of AI hits a solid wall of security noise. When thousands of AI-powered versions and vulnerability alerts flood the pipeline, the new definition of “protection” is now the enemy of flow. Do we add more scanners, tools, and alerts? Hardly. 

The real challenge in the modern supply chain is not adding yet more layers of defense; it’s providing an integrated security approach that prioritizes the experience and efficiency of hybrid development teams. In this session, we move past the high-level panic to focus on the individual development workflow. We’ll explore how to navigate the surge of AI-generated threats without being paralyzed by false positives or irrelevant data at scale. You’ll learn a practical framework for identifying high-impact risks in context, ensuring that security is always-on, but not always-present.

 Join us to see how great security and great developer experience can coexist, allowing you to scale AI without sacrificing the speed or joy of creating.

AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.

When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.

We’ve unlocked the ability to produce software at the speed of thought, but many of our companies’ governance models are still moving at the speed of paper. This friction is increasingly the greatest threat to AI adoption in the enterprise. In this session, we’ll map out a technical architecture for establishing trust within an AI-augmented supply chain, providing a technical blueprint for the modern software delivery organization. We’ll explore the new mandate: governance must evolve from a manual gatekeeper to an automated fabric of trust to ensure your organization stays compliant – without stifling the momentum of AI-driven innovation.

AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.

When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.

Since 2016, the partnership between Deutsche Börse Group and JFrog has evolved from a tactical repository solution into a cornerstone of our global security architecture. 

This session explores our journey from managing binary storage to navigating a critical security landscape, highlighted by a pivotal 2024 security intelligence report from the JFrog Security Research team. We will detail our transition toward a comprehensive security posture – leveraging JFrog Xray, JFrog Advanced Security, and JFrog Curation – to insulate our software supply chain against emerging threats. 

Finally, we will share our strategic vision for an “AI-infused SDLC,” where agentic automation and platform synergy redefine operational resilience in a highly regulated financial environment.

Navigating organizational change at scale presents inherent difficulties. This session will detail how Capital One is strategically leveraging AI tooling and agentic users to significantly reduce the adoption curve for changes impacting our developer community. By integrating AI, we are empowering developers to dedicate more time to core business value creation while simultaneously streamlining the management of organizational changes. We will present specific use cases surrounding JFrog products, illustrating how to facilitate change management, explore the advanced approaches to deploying AI tooling for this purpose, and analyze the resulting positive impact on developer productivity and focus.

AI and Model Context Protocols (MCP) have unlocked ‘Extreme Velocity,’ but this emerging productivity surge has a dark side. Threat actors are now using the same automation to launch coordinated attacks, like the Shai-Hulud incident, hiding malicious code within the noise of high-frequency releases.

When manual security gates fail, how do you maintain governance? This session provides the blueprint for high-velocity artifact trust. Learn to evolve your definition of ‘trusted software’ and implement strategies that secure your supply chain against new threats – such as malicious MCP servers and risky ML models – without slowing down innovation.

Scale is the final barrier to AI-driven velocity. As operations go global, complexity often kills the speed you’ve worked so hard to gain. This session provides the blueprint for scaling DevOps from one high-performing team to a unified global organization—without sacrificing integrity or governance.

Learn how to deconstruct enterprise complexity using JFrog Projects and Federation to eliminate cross-border drift. We’ll demonstrate how High Availability keeps your engine running and how modern Distribution handles massive edge environments with absolute precision. Stop managing noise and start scaling impact!

Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.

Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.

Noise is the new bottleneck. As AI accelerates development, teams are increasingly drowning in security alerts that stall progress. This session outlines how to silence the chaos and refocus your resources on what truly matters.

Discover how to transition to contextualized insights and agentic security to fix only the vulnerabilities that pose a real risk to your applications. We will explore how to automate governance and risk decisions, ensuring your security posture scales alongside your innovation. Join us to learn how to build a high-velocity supply chain where trust is automated, not manual.

Featured Customers

Sigurd Pollmann

 SVP, Head of DevSecOps Toolchain & Operations
Deutsche Börse

Christian Gorke

CISO / Chief ICT Risk Officer
Deutsche Börse

Sigurd Pollmann

 SVP, Head of DevSecOps Toolchain & Operations

Christian Gorke

CISO / Chief ICT Risk Officer

Meet the Frogs

Eyal Dyment

VP, Security Product

Shlomi Ben Haim​

CEO and Co-Founder

Yoav Landman

CTO and Co-Founder

Yuval Fernbach

VP, CTO MLOps

Haggai Schechtman

VP, DevGovOps Product

Yossi Shaul

SVP, DevOps Product

Ronny Belenitsky

Director, DevGovOps Product

Shai Ben-Tovim

VP, DevOps Product

Yoav Landman

CTO and Co-Founder

Shlomi Ben Haim​

CEO and Co-Founder

Yuval Fernbach

VP, CTO MLOps

Eyal Dyment

VP, Security Product

Yossi Shaul

SVP, DevOps Product

Haggai Schechtman

VP, DevGovOps Product

Ronny Belenitsky

Director, DevGovOps Product

Shai Ben-Tovim

VP of Product

Save your spot

LEAP Frankfurt 2026

Sofitel Frankfurt Opera, Frankfurt
May 12TH-13TH

** All the fields should be mandatory 

You're in!

Looking forward to seeing you