BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//juliacon-2026//talk//PAH3UZ
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-juliacon-2026-PAH3UZ@pretalx.com
DTSTART;TZID=CET:20260814T113000
DTEND;TZID=CET:20260814T120000
DESCRIPTION:Professional Julia use requires industrial security. This chall
 enge is unique because risks often hide in binary dependencies (JLLs) that
  standard tools ignore. This talk\, following the launch of the J**ulia Se
 curity Working Group**\, shows how **Trivy** was adapted to scan the entir
 e Julia dependency graph. We explore the implementation of this workflow w
 ithin **JuliaHub** to provide automated security auditing and **SBOM gener
 ation** for any Julia project\, ensuring safety for all.
DTSTAMP:20260502T104018Z
LOCATION:Room 1
SUMMARY:Securing the Supply Chain: Vulnerability Scanning for Julia - Mridu
 l Ranjan Upadhyay\, Venkatesh Dayanand
URL:https://pretalx.com/juliacon-2026/talk/PAH3UZ/
END:VEVENT
END:VCALENDAR
