November 10, 2022

Device Security by Design

Finding the right level of security, from secure enclaves to cryptography accelerators.

November 10, 2022

Device Security by Design

Finding the right level of security, from secure enclaves to cryptography accelerators.

Facebook
Twitter
LinkedIn
Days
Hours
Minutes
Seconds

As engineers work to connect everything from thermostats to cars to the internet, the question of security has become impossible to ignore. But dialing in the right level of security for a new product is a tricky task, requiring you to test—or at least investigate—a wide array of hardware and software technologies, from secure enclaves that will sit on your PCB to cryptography accelerators in the SoC at the heart of your design.

Engineers need to ask themselves tough questions during the design phase. What’s the potential impact of a hack? Who will be harmed by a breach and what will the extent of the damage be? What can you do within your budget, form factor, and power envelope? How long will the device be in use? Can you send software fixes or patches wirelessly? we will discuss the ins and outs of security technologies that you can add to your toolbox and consult experts on the best way to navigate challenges.

Certificates

Complete all modules to receive a certificate of completion.

Prize Giveaways

We are giving away more than $3,500 in prizes to 14 lucky attendees.

Modules

Building a Foundation for Security in Hardware

With the rising value of data and computing hardware itself, the threats from adversaries are greater than ever.

11:00 am EST/10:00 am CST

Filling the WHOLE in Holistic Security

All too often, designs are started with proof of concepts, prototypes, early releases, and somewhere later in the process, security capabilities get added to the design.

12:00 pm EST/11:00 am CST

Securing Matter – The IoT Collaboration

Matter is an IoT collaboration protocol designed to blend disparate IoT protocols like Zigbee and Thread together into a secure, interactive environment. This requires a significant amount of cooperation when it comes to security.

1:00 pm EST/12:00 pm CST

Are You Tasked with Product Security? Avoid getting lost in the Depths of Defense

Come learn what level of security is appropriate and avoid many of the pitfalls common in product security. Learn how to match threat landscapes to IoT profiles and select the cybersecurity features to get you there. Navigate the depths and stay on course!

2:00 pm EST/1:00 pm CST

Cryptographic Standards in a Post Quantum World

In this presentation, PQShield will provide an overview of the new Post Quantum Encryption Standards from NIST.

3:00 pm EST/2:00 pm CST

Day of Learning Includes

Already registered on this site?
Log in here.

Sponsored by