Filling the WHOLE in Holistic Security 

All too often, designs are started with proof of concepts, prototypes, early releases, and somewhere later in the process, security capabilities get added to the design. Unfortunately, security cannot be bolted on to a design afterward. Holistic security requires that it be included at ALL stages of the design process. We will discuss secure design processes, security standards, secure architectures, and security throughout the lifecycle of a device.

About the Presenter

Chuck Brokish,
Director of Automotive Business Development
Green Hill Software

Chuck Brokish is the Director of Automotive Business Development at Green Hills Software. He has over 30 years of experience in the embedded systems, in areas of processor architecture design, mobile communications, automotive active noise control, infotainment, ADAS, and V2X. He has been working on embedded security for over 25 years. Chuck is a registered Professional Engineer, has been active on advisory councils and industry forums and standards committees including ISO, SAE, IEEE, MIPI, and Global Platform. He has patents in the areas of Secure Processor design, Real‐time Debug, Active Noise Control, and DSP architectures.

Not Enrolled

Course Includes

  • 5 Lessons