|
Start Date:7/23/2020 Start Time:11:00 AM EDT Duration:60 minutes Abstract:We are living in a world where devices are becoming more connected. And this opens the door to innovation and new business opportunities. But it also leaves device manufacturers and OEMs struggling to balance evolving market demands with staying ahead of the growing threat of cyberattacks and the potential for product recalls. For designers, baking security into embedded products takes a great deal of knowledge and experience. For integrators, ensuring the level of security within each underlying component presents its own set of challenges. So, to ensure the security of your products, you need a holistic approach that lets you continuously assess every attack surface, from the lowest level in the end-point, all the way into the cloud. This one-hour webinar will explore two key areas of the holistic security chain: embedded security on end-points and security challenges for system integrators.
You will learn about: • Techniques and solutions to design and develop threat-resilient end-points • The many flavors of access control • Best practices to address integration issues, including building a software “nutrition label” • How to establish a software inventory to continually assess threats
If you're already registered for the Embedded System Security Across the Supply Chain webcast, click below: ALREADY REGISTERED?
Speakers Anonymized 25946611
 Anonymized 26589237
|
Embedded System Security Across the Supply Chain
Registration Is Closed
|
|
|
© 2025. All rights reserved.
|