November 10, 2022
Device Security by Design
Finding the right level of security, from secure enclaves to cryptography accelerators.
November 10, 2022
Device Security by Design
Finding the right level of security, from secure enclaves to cryptography accelerators.
As engineers work to connect everything from thermostats to cars to the internet, the question of security has become impossible to ignore. But dialing in the right level of security for a new product is a tricky task, requiring you to test—or at least investigate—a wide array of hardware and software technologies, from secure enclaves that will sit on your PCB to cryptography accelerators in the SoC at the heart of your design.
Engineers need to ask themselves tough questions during the design phase. What’s the potential impact of a hack? Who will be harmed by a breach and what will the extent of the damage be? What can you do within your budget, form factor, and power envelope? How long will the device be in use? Can you send software fixes or patches wirelessly? we will discuss the ins and outs of security technologies that you can add to your toolbox and consult experts on the best way to navigate challenges.
Certificates
Complete all modules to receive a certificate of completion.
Prize Giveaways
We are giving away more than $3,500 in prizes to 14 lucky attendees.
Modules
Building a Foundation for Security in Hardware
11:00 am EST/10:00 am CST
Building a Foundation for Security in Hardware
With the rising value of data and computing hardware itself, the threats from adversaries are greater than ever. As such, a security strategy for applications and devices needs to begin at the hardware level. Rambus security expert, Bart Stevens will discuss how a hardware root of trust can be the foundation for security through defense in depth, partitioning of secure operations, and state-of-the-art protections from side channel attacks.
Marcel Van Loon
Security Solutions Architect
RAMBUS
Marcel Van Loon is Security Solutions Architect with Rambus. He graduated from Eindhoven University of Technology and has worked with a number of companies in the security industry including NXP, Verimatrix, Irdeto and Securealink.
Marcel Van Loon
Security Solutions Architect
RAMBUS
Marcel Van Loon is Security Solutions Architect with Rambus. He graduated from Eindhoven University of Technology and has worked with a number of companies in the security industry including NXP, Verimatrix, Irdeto and Securealink.
Building a Foundation for Security in Hardware
With the rising value of data and computing hardware itself, the threats from adversaries are greater than ever. As such, a security strategy for applications and devices needs to begin at the hardware level. Rambus security expert, Bart Stevens will discuss how a hardware root of trust can be the foundation for security through defense in depth, partitioning of secure operations, and state-of-the-art protections from side channel attacks.
Marcel Van Loon
Security Solutions Architect
RAMBUS
Marcel Van Loon is Security Solutions Architect with Rambus. He graduated from Eindhoven University of Technology and has worked with a number of companies in the security industry including NXP, Verimatrix, Irdeto and Securealink.
Marcel Van Loon
Security Solutions Architect
RAMBUS
Marcel Van Loon is Security Solutions Architect with Rambus. He graduated from Eindhoven University of Technology and has worked with a number of companies in the security industry including NXP, Verimatrix, Irdeto and Securealink.
Filling the WHOLE in Holistic Security
12:00 pm EST/11:00 am CST
Filling the WHOLE in Holistic Security
All too often, designs are started with proof of concepts, prototypes, early releases, and somewhere later in the process, security capabilities get added to the design. Unfortunately, security cannot be bolted on to a design afterward. Holistic security requires that it be included at ALL stages of the design process. We will discuss secure design processes, security standards, secure architectures, and security throughout the lifecycle of a device.
Chuck Brockish
Director of Automotive Business Development
Green Hills Software
Chuck Brokish is the Director of Automotive Business Development at Green Hills Software. He has over 30 years of experience in the embedded systems, in areas of processor architecture design, mobile communications, automotive active noise control, infotainment, ADAS, and V2X. He has been working on embedded security for over 25 years. Chuck is a registered Professional Engineer, has been active on advisory councils and industry forums and standards committees including ISO, SAE, IEEE, MIPI, and Global Platform. He has patents in the areas of Secure Processor design, Real-time Debug, Active Noise Control, and DSP architectures.
Chuck Brockish
Director of Automotive Business Development
Green Hills Software
Chuck Brokish is the Director of Automotive Business Development at Green Hills Software. He has over 30 years of experience in the embedded systems, in areas of processor architecture design, mobile communications, automotive active noise control, infotainment, ADAS, and V2X. He has been working on embedded security for over 25 years. Chuck is a registered Professional Engineer, has been active on advisory councils and industry forums and standards committees including ISO, SAE, IEEE, MIPI, and Global Platform. He has patents in the areas of Secure Processor design, Real-time Debug, Active Noise Control, and DSP architectures.
Filling the WHOLE in Holistic Security
All too often, designs are started with proof of concepts, prototypes, early releases, and somewhere later in the process, security capabilities get added to the design. Unfortunately, security cannot be bolted on to a design afterward. Holistic security requires that it be included at ALL stages of the design process. We will discuss secure design processes, security standards, secure architectures, and security throughout the lifecycle of a device.
Chuck Brockish
Director of Automotive Business Development
Green Hills Software
Chuck Brokish is the Director of Automotive Business Development at Green Hills Software. He has over 30 years of experience in the embedded systems, in areas of processor architecture design, mobile communications, automotive active noise control, infotainment, ADAS, and V2X. He has been working on embedded security for over 25 years. Chuck is a registered Professional Engineer, has been active on advisory councils and industry forums and standards committees including ISO, SAE, IEEE, MIPI, and Global Platform. He has patents in the areas of Secure Processor design, Real-time Debug, Active Noise Control, and DSP architectures.
Chuck Brockish
Director of Automotive Business Development
Green Hills Software
Chuck Brokish is the Director of Automotive Business Development at Green Hills Software. He has over 30 years of experience in the embedded systems, in areas of processor architecture design, mobile communications, automotive active noise control, infotainment, ADAS, and V2X. He has been working on embedded security for over 25 years. Chuck is a registered Professional Engineer, has been active on advisory councils and industry forums and standards committees including ISO, SAE, IEEE, MIPI, and Global Platform. He has patents in the areas of Secure Processor design, Real-time Debug, Active Noise Control, and DSP architectures.
Securing Matter – The IoT Collaboration
1:00 pm EST/12:00 pm CST
Securing Matter – The IoT Collaboration
Matter is an IoT collaboration protocol designed to blend disparate IoT protocols like Zigbee and Thread together into a secure, interactive environment. This requires a significant amount of cooperation when it comes to security.
Rob Alexander
Principle Product Manager
Silicon Labs
Rob Alexander has been with Silicon Labs for over ten years. He was also on the Board of Directors for the Zigbee Alliance, now known as Connectivity Standards Alliance.
Rob Alexander
Principle Product Manager
Silicon Labs
Rob Alexander has been with Silicon Labs for over ten years. He was also on the Board of Directors for the Zigbee Alliance, now known as Connectivity Standards Alliance.
Securing Matter – The IoT Collaboration
Matter is an IoT collaboration protocol designed to blend disparate IoT protocols like Zigbee and Thread together into a secure, interactive environment. This requires a significant amount of cooperation when it comes to security.
Rob Alexander
Principle Product Manager
Silicon Labs
Rob Alexander has been with Silicon Labs for over ten years. He was also on the Board of Directors for the Zigbee Alliance, now known as Connectivity Standards Alliance.
Rob Alexander
Principle Product Manager
Silicon Labs
Rob Alexander has been with Silicon Labs for over ten years. He was also on the Board of Directors for the Zigbee Alliance, now known as Connectivity Standards Alliance.
Are You Tasked with Product Security? Avoid getting lost in the Depths of Defense
2:00 pm EST/1:00 pm CST
Are You Tasked with Product Security? Avoid getting lost in the Depths of Defense
Come learn what level of security is appropriate and avoid many of the pitfalls common in product security. Learn how to match threat landscapes to IoT profiles and select the cybersecurity features to get you there. Navigate the depths and stay on course!
Jonathon Reach
Director Cybersecurity Services
BG Networks
Jonathon Reach, Director Cybersecurity Services at BG Networks, is an embedded security expert with extensive automotive and IoT experience. Prior to BG Networks, Jonathon served as Global Head of Product Security at Dana Incorporated and as Cybersecurity Product Engineer with Aptiv. He holds a degree in Computer Science from Wayne State University.
Jonathon Reach
Director Cybersecurity Services
BG Networks
Jonathon Reach, Director Cybersecurity Services at BG Networks, is an embedded security expert with extensive automotive and IoT experience. Prior to BG Networks, Jonathon served as Global Head of Product Security at Dana Incorporated and as Cybersecurity Product Engineer with Aptiv. He holds a degree in Computer Science from Wayne State University.
Are You Tasked with Product Security? Avoid getting lost in the Depths of Defense
Come learn what level of security is appropriate and avoid many of the pitfalls common in product security. Learn how to match threat landscapes to IoT profiles and select the cybersecurity features to get you there. Navigate the depths and stay on course!
Jonathon Reach
Director Cybersecurity Services
BG Networks
Jonathon Reach, Director Cybersecurity Services at BG Networks, is an embedded security expert with extensive automotive and IoT experience. Prior to BG Networks, Jonathon served as Global Head of Product Security at Dana Incorporated and as Cybersecurity Product Engineer with Aptiv. He holds a degree in Computer Science from Wayne State University.
Jonathon Reach
Director Cybersecurity Services
BG Networks
Jonathon Reach, Director Cybersecurity Services at BG Networks, is an embedded security expert with extensive automotive and IoT experience. Prior to BG Networks, Jonathon served as Global Head of Product Security at Dana Incorporated and as Cybersecurity Product Engineer with Aptiv. He holds a degree in Computer Science from Wayne State University.
Cryptographic Standards in a Post Quantum World
3:00 pm EST/2:00 pm CST
Cryptographic Standards in a Post Quantum World
In this presentation, PQShield will provide an overview of the new Post Quantum Encryption Standards from NIST, including information on the following topics:
- The current status of quantum computers and their ability to break existing encryption algorithms
- What does it mean when we say “quantum computers will break existing encryption algorithms”
- What is the status of the NIST standardization efforts
- What does this all mean for engineers and product designers
- Why it is important to get started now on the migration to PQC algorithms
Alan Grau
VP Sales & Business Development
PQ Shield
Alan Grau
VP Sales & Business Development
PQ Shield
Alan has 25 years of experience in telecommunications and the embedded software marketplace. Formerly VP of IoT, Embedded Solutions at Sectigo, Alan joined Sectigo as part of the company’s acquisition of Icon Labs, a leading provider of security software for IoT and embedded devices, where he was CTO and co-founder. Alan has an MS in computer science from Northwestern University.
Cryptographic Standards in a Post Quantum World
In this presentation, PQShield will provide an overview of the new Post Quantum Encryption Standards from NIST, including information on the following topics:
- The current status of quantum computers and their ability to break existing encryption algorithms
- What does it mean when we say “quantum computers will break existing encryption algorithms”
- What is the status of the NIST standardization efforts
- What does this all mean for engineers and product designers
- Why it is important to get started now on the migration to PQC algorithms
Alan Grau
VP Sales & Business Development
PQ Shield
Alan Grau
VP Sales & Business Development
PQ Shield
Alan has 25 years of experience in telecommunications and the embedded software marketplace. Formerly VP of IoT, Embedded Solutions at Sectigo, Alan joined Sectigo as part of the company’s acquisition of Icon Labs, a leading provider of security software for IoT and embedded devices, where he was CTO and co-founder. Alan has an MS in computer science from Northwestern University.
Day of Learning Includes
- Five sessions
- Free registration
- On-demand access
- Learn from anywhere
- Certificate of completion
- Prize giveaways
Already registered on this site?
Log in here.
Sponsored by