Archived Webcasts

Upcoming Webcasts

Nov
10
2020
Sponsored by: Wind River
9PM EDT (1 year, 2 months ago)
Intelligent systems are notoriously hard to develop, and are becoming an ever-larger attack surface with their growing deployments in multi-layered architectures. Developers are struggling to respond to this increasing complexity, while being asked to deploy new technologies, such as AI, and staying...
Nov
10
2020
Sponsored by: Sensory
9AM EDT (1 year, 2 months ago)
Voice-enabled devices are everywhere. However, many of these devices today can be accessed and controlled by just about any user. There are obvious security risks associated with not limiting device access, especially when these devices are linked to various aspects of your business.
Nov
10
2020
Sponsored by: Cisco
6PM EDT (1 year, 2 months ago)
Protecting industrial operations against cyber threats is a very specific challenge. As more devices get connected with more remote access and new applications, the airgap between IT and OT networks erodes and the IDMZ is not sufficient.
Nov
10
2020
Sponsored by: Google
6PM EDT (1 year, 2 months ago)
The soft security underbelly and resulting lack of trust in Things poses a significant headwind for realizing the IoT’s awesome potential. An efficient, public security measurement scheme is the most important foundation for addressing this trust crisis, and this talk will provide a review of exciti...
Nov
10
2020
Sponsored by: Linux Foundation
8AM EDT (1 year, 2 months ago)
Open-source software is becoming a de-facto mechanism for ecosystems that are building Edge-based solutions, especially in the areas of life cycle management, APIs, etc. At the same time, a focus on end-to-end processes like code scanning, vulnerabilities, auto patching, and process handoffs are imp...
Nov
04
2020
Sponsored by: Star Lab - a Wind River Company, Curtiss-Wright, Mercury Systems
11AM EDT (1 year, 2 months ago)
Commercial Solutions for Classified (CSfC) is part of the National Security Agency’s (NSA’s) commercial cybersecurity strategy to leverage commercial technology to protect national security systems. CSFC simultaneously implements two compliant commercial security components in a layered solution to...
Oct
27
2020
Sponsored by: Blackberry QNX
11AM EDT (1 year, 2 months ago)
Hypervisors create virtual machines that are well-insulated from external corruption and allow mixed systems with different safety requirements to run on the same system-on-a-chip (SoC).  But virtualization is rarely straightforward. Your virtualized guest’s operating system may have limited configu...
Oct
27
2020
Sponsored by: Ansys, RTI
2PM EDT (1 year, 2 months ago)
This webinar will deliver an introduction to avionics safety standards, and specifically RTCA DO-178C for software. It will cover the required documents for achieving DO-178C safety certification and the challenges of creating commercial-off-the-shelf (COTS) certification evidence for commercial av...
Oct
22
2020
Sponsored by: Advantech
2PM EDT (1 year, 2 months ago)
The current and future trends that will have a positive effect on C5ISR capabilities in mission critical systems. With the advent of edge computing and the benefits of 5G it is understood that emerging networks and data fusion will revolutionize battlefield information. Artificial intelligence, mach...
Oct
21
2020
Sponsored by: Infineon Technologies
11AM EDT (1 year, 2 months ago)
As wireless charging begins to see wider adoption due to its convenience, the need for security becomes even more critical. Designing security into wireless devices enables a safe, reliable and convenient way to charge electronic devices. It also prevents overheating, counterfeits and other safety c...
Oct
20
2020
Sponsored by: Afuzion, RTI
2PM EDT (1 year, 2 months ago)
This webinar will deliver an introduction to avionics safety standards, and specifically RTCA DO-178C for software. It will cover the required documents for achieving DO-178C safety certification and the challenges of creating commercial-off-the-shelf (COTS) certification evidence for commercial av...
Oct
08
2020
Sponsored by: Abaco, Elma, Pentek
2PM EDT (1 year, 3 months ago)
As military radar, signals intelligence (SIGINT) and electronic warfare systems get more complex so does the associated signal integrity challenges. These signal integrity concerns didn't even exist 10-15 years ago. Today as signal density for connectors continues to get tighter as footprints get sm...
Sep
29
2020
Sponsored by: Intel IoT Solutions Alliance
11AM EDT (1 year, 3 months ago)
Digital transformation projects have accelerated in 2020, specifically using Telemetry and Video Analytics. Organizations are challenged with a wide variety of options and multi-vendor deployments that lead to delays and challenges. Arrow and ADLINK have teamed up with Microsoft to streamline deploy...
Sep
28
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device. 
Sep
27
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.
Sep
26
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access. 
Sep
25
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
Sep
24
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
Sep
23
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
Sep
22
2020
Sponsored by: Advantech Europe
2PM EDT (1 year, 3 months ago)
Embedded Single Boards are the solutions-to-go to meet high performance IoT demands. Don't compromise for performance & board size: learn how to easily migrate actual and future application demands like Artificial Intelligence of Things and 5G connectivity using our tailored system approach with ou...
Sep
22
2020
Sponsored by: Wind River
8AM EDT (1 year, 3 months ago)
Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of the journey.
Sep
15
2020
Sponsored by: ACT, LCR Embedded Systems, nVent Schroff
2PM EDT (1 year, 4 months ago)
Radar, electronic warfare, and intelligence, surveillance and reconnaissance (ISR) systems all depend heavily on superior signal processing solutions that often leverage commercial processors, graphics processors, FPGAs, etc. These devices provide unprecedented performance but also create headaches...
Sep
02
2020
Sponsored by: IAR Systems
11AM EDT (1 year, 4 months ago)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...
Aug
26
2020
Sponsored by: IAR Systems
11AM EDT (1 year, 4 months ago)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Aug
19
2020
Sponsored by: IAR Systems
11AM EDT (1 year, 5 months ago)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...

Upcoming Webcasts