CYBERSECURITY FOR THE INTELLIGENT EDGE

Join Wind River® Principal Security Architect Arlen Baker for a fast-paced look at how to design cybersecurity into can’t-fail devices and systems at the edge.

  • Cybersecurity Essentials for the Intelligent Edge

    Cybersecurity Essentials for the Intelligent Edge

    ​In this interactive executive briefing, Wind River will walk you through the tech must-haves to successfully protect your systems and devices through their life cycle.

    Explore
  • 10 Properties of Secure Embedded Systems

    10 Properties of Secure Embedded Systems

    Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks

    Explore
  • The Cybersecurity Journey Through the Full Product Lifecycle3:09

    The Cybersecurity Journey Through the Full Product Lifecycle

    Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages...

    WATCH
  • Capturing Use Case Security Requirements4:57

    Capturing Use Case Security Requirements

    Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you...

    WATCH
  • Building a Security Policy4:23

    Building a Security Policy

    Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk...

    WATCH
  • Designing with a Trusted Foundation4:50

    Designing with a Trusted Foundation

    Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code...

    WATCH
  • Hardening and Fortifying3:57

    Hardening and Fortifying

    You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your...

    WATCH
  • Ongoing Threat Prevention3:48

    Ongoing Threat Prevention

    Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in...

    WATCH
  • Putting It All Together3:15

    Putting It All Together

    Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.

    WATCH
  • loading
    Loading More...