Archived Webcasts
Nov
10
2020
Six Security Policies Manufacturers Must Understand to Protect Their IoT and Other Connected Devices
Sponsored by: Icon Labs
5:30PM EDT (4 years ago)
Effective IoT and connected device security begins with the device's initial design process including the device's various components. Each component and sub-assembly that is integrated into the final product must be secure and immune from cyberattack. To secure embedded devices, IoT and connected d...
Nov
10
2020
Sponsored by: Kudelski Group
9:15PM EDT (4 years ago)
Protecting industrial equipment and technology from attacks and enabling new secure features and business models are critical to the success of IoT. But to do so requires careful, deliberate approaches to designing, running and sustaining robust security over time. What lessons can be learned from o...
Nov
10
2020
Sponsored by: Cypress
4:00PM EDT (4 years ago)
IoT device security requires a solid understanding of embedded hardware and software capabilities, cloud-based security, and knowledge of the changing security standards implemented by local governments and global industry bodies. Today’s IoT devices must also address a growing set of requirements t...
Nov
10
2020
Sponsored by: IAR Systems
11:00AM EDT (4 years ago)
Embedded applications require security. No debate there. As companies try to meet the ongoing changes in IoT device legislation, they are discovering that legislation is actually the starting point. At the same time, there’s a growing need to both protect the IP and ensure that product integrity is...
Nov
10
2020
Sponsored by: Premio
4:15PM EDT (4 years ago)
The convergence of IT with vulnerable OT has exposed the inherent weaknesses that can result in attacks on the industrial IoT. Such vulnerabilities include poorly-secured industrial systems. AI/ML provides hyperintelligent cybersecurity and threat mitigation for platforms based on Industry 4.0. To d...
Nov
10
2020
Sponsored by: AbsInt GmbH
6:30PM EDT (4 years ago)
Static code analysis is a widely-used technique to demonstrate compliance to coding guidelines, such as MISRA C/C++ or SEI CERT C. Another aspect is to find critical programming defects, and even demonstrate their absence: abstract interpretation-based analyzers can guarantee to detect all code defe...
Nov
10
2020
Sponsored by: Cisco
6:30PM EDT (4 years ago)
Protecting industrial operations against cyber threats is a very specific challenge. As more devices get connected with more remote access and new applications, the airgap between IT and OT networks erodes and the IDMZ is not sufficient.
Nov
10
2020
Sponsored by: Data I/O
6:00PM EDT (4 years ago)
The connected and autonomous vehicles are driving new architectural designs to ECUs that connect various subsystems together and expose them to the outside world over various networks. These advancements increase the risk of threat actors gaining access to the subsystems. This session examines found...
Nov
10
2020
Sponsored by: Veridify
6:00PM EDT (4 years ago)
We all know securing small devices in the IoT is hard, and the goal of many manufacturers is to secure and ‘manage’ a device from birth to retirement, creating even more security challenges. This talk will look at what makes securing low-resource IoT devices a challenge, with a specific focus on add...
Nov
10
2020
Sponsored by: Imagination Technologies
6:30PM EDT (4 years ago)
Devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices add cost and complexity. It's an industry wide is...
Nov
10
2020
Sponsored by: Green Hills Software
8:00PM EDT (4 years ago)
Many cybersecurity techniques focus on securing the perimeter of critical computer systems and recovering in the event of failure. In this talk we'll take a new perspective on building safe and secure systems. This talk will: Take a holistic view of cybersecurity for automotive systems from the bott...
Nov
10
2020
Sponsored by: Wind River
9:00PM EDT (4 years ago)
Intelligent systems are notoriously hard to develop, and are becoming an ever-larger attack surface with their growing deployments in multi-layered architectures. Developers are struggling to respond to this increasing complexity, while being asked to deploy new technologies, such as AI, and staying...
Nov
10
2020
Sponsored by: Sensory
9:30AM EDT (4 years ago)
Voice-enabled devices are everywhere. However, many of these devices today can be accessed and controlled by just about any user. There are obvious security risks associated with not limiting device access, especially when these devices are linked to various aspects of your business.
Nov
10
2020
Sponsored by: Linux Foundation
8:15AM EDT (4 years ago)
Open-source software is becoming a de-facto mechanism for ecosystems that are building Edge-based solutions, especially in the areas of life cycle management, APIs, etc. At the same time, a focus on end-to-end processes like code scanning, vulnerabilities, auto patching, and process handoffs are imp...
Nov
10
2020
Sponsored by: Arm
5:00PM EDT (4 years ago)
With IoT services relying on trusted data, it’s important that devices are designed with this in mind. But how do you design a secure product? In this session we’ll explore how to build-in security using threat modeling and careful component selection. We’ll outline different levels of security to g...
Nov
04
2020
Sponsored by: Star Lab - a Wind River Company, Curtiss-Wright, Mercury Systems
11:00AM EDT (4 years ago)
Commercial Solutions for Classified (CSfC) is part of the National Security Agency’s (NSA’s) commercial cybersecurity strategy to leverage commercial technology to protect national security systems. CSFC simultaneously implements two compliant commercial security components in a layered solution to...
Oct
27
2020
Sponsored by: Blackberry QNX
11:00AM EDT (4 years ago)
Hypervisors create virtual machines that are well-insulated from external corruption and allow mixed systems with different safety requirements to run on the same system-on-a-chip (SoC). But virtualization is rarely straightforward. Your virtualized guest’s operating system may have limited configu...
Oct
27
2020
Sponsored by: Ansys, RTI
2:00PM EDT (4 years ago)
This webinar will deliver an introduction to avionics safety standards, and specifically RTCA DO-178C for software. It will cover the required documents for achieving DO-178C safety certification and the challenges of creating commercial-off-the-shelf (COTS) certification evidence for commercial av...
Oct
22
2020
Sponsored by: Advantech
2:00PM EDT (4 years, 1 month ago)
The current and future trends that will have a positive effect on C5ISR capabilities in mission critical systems. With the advent of edge computing and the benefits of 5G it is understood that emerging networks and data fusion will revolutionize battlefield information. Artificial intelligence, mach...
Oct
21
2020
Sponsored by: Infineon Technologies
11:00AM EDT (4 years, 1 month ago)
As wireless charging begins to see wider adoption due to its convenience, the need for security becomes even more critical. Designing security into wireless devices enables a safe, reliable and convenient way to charge electronic devices. It also prevents overheating, counterfeits and other safety c...
Oct
20
2020
Sponsored by: Afuzion, RTI
2:00PM EDT (4 years, 1 month ago)
This webinar will deliver an introduction to avionics safety standards, and specifically RTCA DO-178C for software. It will cover the required documents for achieving DO-178C safety certification and the challenges of creating commercial-off-the-shelf (COTS) certification evidence for commercial av...
Oct
08
2020
Sponsored by: Abaco, Elma, Pentek
2:00PM EDT (4 years, 1 month ago)
As military radar, signals intelligence (SIGINT) and electronic warfare systems get more complex so does the associated signal integrity challenges. These signal integrity concerns didn't even exist 10-15 years ago. Today as signal density for connectors continues to get tighter as footprints get sm...
Sep
29
2020
Sponsored by: Intel IoT Solutions Alliance
11:00AM EDT (4 years, 1 month ago)
Digital transformation projects have accelerated in 2020, specifically using Telemetry and Video Analytics. Organizations are challenged with a wide variety of options and multi-vendor deployments that lead to delays and challenges. Arrow and ADLINK have teamed up with Microsoft to streamline deploy...
Sep
28
2020
Sponsored by: Wind River
8:00AM EDT (4 years, 1 month ago)
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.
Sep
27
2020
Sponsored by: Wind River
8:00AM EDT (4 years, 1 month ago)
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.