You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.
Speakers
Arlen Baker
Principal Security Architect
Wind River
Director-level cybersecurity technologist with over 20 years experience architecting, securing, and deploying mission-critical systems for various markets including defense, medical industry, and industrial sectors.