Upcoming Webcasts Calendar

View Archived Webcasts

Nov
04
2020
Sponsored by: Star Lab - a Wind River Company, Curtiss-Wright, Mercury Systems
11AM EDT (in 4 days, 16 hours)
Commercial Solutions for Classified (CSfC) is part of the National Security Agency’s (NSA’s) commercial cybersecurity strategy to leverage commercial technology to protect national security systems. CSFC simultaneously implements two compliant commercial security components in a layered solution to...
Nov
10
2020
Sponsored by: Cypress
4PM EDT (in 10 days, 21 hours)
IoT device security requires a solid understanding of embedded hardware and software capabilities, cloud-based security, and knowledge of the changing security standards implemented by local governments and global industry bodies. Today’s IoT devices must also address a growing set of requirements t...
Nov
10
2020
Sponsored by: Trusted Computing Group
2PM EDT (in 10 days, 19 hours)
In recent years, a rising tide of cyber-attacks on industrial systems have threatened safety and reliability. The world has learned that there is no industrial safety without cyber security. But during these same years, an international group of experts has developed a comprehensive standard for ind...
Nov
10
2020
Sponsored by: IAR Systems
11AM EDT (in 10 days, 16 hours)
Embedded applications require security. No debate there. As companies try to meet the ongoing changes in IoT device legislation, they are discovering that legislation is actually the starting point. At the same time, there’s a growing need to both protect the IP and ensure that product integrity is...
Nov
10
2020
Sponsored by: Microchip
2PM EDT (in 10 days, 19 hours)
Developers of IoT solutions have faced major hurdles that protect against physical attacks and remote extraction. Today’s software-only security is wholly inadequate, but the superior approach of adding a secure element to each IoT device and configuring it for storing keys and handling cryptographi...
Nov
10
2020
Sponsored by: Arm
5PM EDT (in 10 days, 22 hours)
With IoT services relying on trusted data, it’s important that devices are designed with this in mind. But how do you design a secure product? In this session we’ll explore how to build-in security using threat modeling and careful component selection. We’ll outline different levels of security to g...
Nov
10
2020
Sponsored by: Silicon Labs
5PM EDT (in 10 days, 22 hours)
This presentation will detail how security threats have changed and escalated, focusing more than ever on IoT. In addition, recent regulation like GDPR in Europe and SB-327 in California protect vulnerable data and privacy by placing more pressure on manufacturers to step up security best practices,...
Nov
10
2020
Sponsored by: Data I/O
6PM EDT (in 11 days, -1 hour)
The connected and autonomous vehicles are driving new architectural designs to ECUs that connect various subsystems together and expose them to the outside world over various networks. These advancements increase the risk of threat actors gaining access to the subsystems. This session examines found...
Nov
10
2020
Sponsored by: AbsInt GmbH
6PM EDT (in 11 days, -1 hour)
Static code analysis is a widely-used technique to demonstrate compliance to coding guidelines, such as MISRA C/C++ or SEI CERT C. Another aspect is to find critical programming defects, and even demonstrate their absence: abstract interpretation-based analyzers can guarantee to detect all code defe...
Nov
10
2020
Sponsored by: Maxim Integrated
7PM EDT (in 11 days)
Electronic content is proliferating in cars at astounding rates, especially as ADAS and Electric Vehicles become more widely available. With the increase of automotive electronics comes heightened vulnerability to various security compromises. This session will discuss several categories of security...
Nov
10
2020
Sponsored by: Icon Labs
5PM EDT (in 10 days, 22 hours)
Effective IoT and connected device security begins with the device's initial design process including the device's various components. Each component and sub-assembly that is integrated into the final product must be secure and immune from cyberattack. To secure embedded devices, IoT and connected d...
Nov
10
2020
Sponsored by: Green Hills Software
8PM EDT (in 11 days, 1 hour)
Many cybersecurity techniques focus on securing the perimeter of critical computer systems and recovering in the event of failure. In this talk we'll take a new perspective on building safe and secure systems. This talk will: Take a holistic view of cybersecurity for automotive systems from the bott...
Nov
10
2020
Sponsored by: Imagination Technologies
6PM EDT (in 11 days, -1 hour)
Devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices add cost and complexity. It's an industry wide is...
Nov
10
2020
Sponsored by: Premio
4PM EDT (in 10 days, 21 hours)
The convergence of IT with vulnerable OT has exposed the inherent weaknesses that can result in attacks on the industrial IoT. Such vulnerabilities include poorly-secured industrial systems. AI/ML provides hyperintelligent cybersecurity and threat mitigation for platforms based on Industry 4.0. To d...
Nov
10
2020
Sponsored by: Veridify
6PM EDT (in 11 days, -1 hour)
We all know securing small devices in the IoT is hard, and the goal of many manufacturers is to secure and ‘manage’ a device from birth to retirement, creating even more security challenges. This talk will look at what makes securing low-resource IoT devices a challenge, with a specific focus on add...
Nov
10
2020
Sponsored by: Kudelski Group
9PM EDT (in 11 days, 2 hours)
Protecting industrial equipment and technology from attacks and enabling new secure features and business models are critical to the success of IoT. But to do so requires careful, deliberate approaches to designing, running and sustaining robust security over time. What lessons can be learned from o...
Nov
10
2020
Sponsored by: Wind River
9PM EDT (in 11 days, 2 hours)
Intelligent systems are notoriously hard to develop, and are becoming an ever-larger attack surface with their growing deployments in multi-layered architectures. Developers are struggling to respond to this increasing complexity, while being asked to deploy new technologies, such as AI, and staying...
Nov
10
2020
Sponsored by: Sensory
9AM EDT (in 10 days, 14 hours)
Voice-enabled devices are everywhere. However, many of these devices today can be accessed and controlled by just about any user. There are obvious security risks associated with not limiting device access, especially when these devices are linked to various aspects of your business.
Nov
10
2020
Sponsored by: Cisco
6PM EDT (in 11 days, -1 hour)
Protecting industrial operations against cyber threats is a very specific challenge. As more devices get connected with more remote access and new applications, the airgap between IT and OT networks erodes and the IDMZ is not sufficient.
Nov
10
2020
Sponsored by: Google
6PM EDT (in 11 days, -1 hour)
The soft security underbelly and resulting lack of trust in Things poses a significant headwind for realizing the IoT’s awesome potential. An efficient, public security measurement scheme is the most important foundation for addressing this trust crisis, and this talk will provide a review of exciti...
Nov
10
2020
Sponsored by: Linux Foundation
8AM EDT (in 10 days, 13 hours)
Open-source software is becoming a de-facto mechanism for ecosystems that are building Edge-based solutions, especially in the areas of life cycle management, APIs, etc. At the same time, a focus on end-to-end processes like code scanning, vulnerabilities, auto patching, and process handoffs are imp...
Nov
12
2020
Sponsored by: Aetina, Nvidia
11AM EDT (in 12 days, 16 hours)
Let 5G Supercharge Your Edge-to-Cloud AI Connection Edge-based AI and 5G are two technologies in the spotlight. If we can combine their use, we can realize great gains. While Edge computing gains the benefits of low-latency, independence, and security, 5G can potentially keep these features intact w...
Nov
12
2020
Sponsored by: Abaco Systems, Elma Electronic, RTI, Wind River, Mercury Systems
2PM EDT (in 12 days, 19 hours)
Experts from all three services -- Air Force, Army, and Navy -- are working together with industry to enable open architectures in intelligence, surveillance, reconnaissance (ISR), radar, and electronic warfare systems. Their efforts through initiatives such as the Sensor Open Systems Architecture (...
Nov
19
2020
Sponsored by: Cadence, DFI, ARM, Achronix, Lattice Semiconductor Corp.
11AM EDT (in 19 days, 16 hours)
Depending on your perspective, autonomous vehicles have been with us for quite some time, or they’re not even close to being here. The former is true in some cases where trials are being run for both passenger vehicles and for trucks. The latter is more the case when you look at mainstream driving d...
Dec
02
2020
Sponsored by: TE Connectivity
2PM EDT (in 1 month, 1 day)
With the rapid advancement of defense systems technology, new interconnect standards are enabling new possibilities for high-density, high-speed connections in harsh environments. This 60-minute webinar explores embedded computing industry trends, as well as new and upcoming standards for rugged int...

View Archived Webcasts