Cybersecurity for the Intelligent Edge

A Microweb Tech Series with Arlen Baker

Watch them all

According to International Data Corporation (IDC), there will be an estimated 42 billion connected devices by 2025. Each of these devices represents a point of entry that can be exploited by a cyberattack. For devices and systems with safety-critical functionality, a security breach can have catastrophic consequences.

Join Wind River® Principal Security Architect Arlen Baker for a fast-paced look at how to design cybersecurity into can’t-fail devices and systems at the edge.

You can have a secure system that is not safety critical, but you cannot have a safety-critical system that isn’t secure.
Matt Jones, Chief Architect, Wind River

The Cybersecurity Journey Through the Full Product Lifecycle

Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of the journey.

Watch Now

Capturing Use Case Security Requirements

Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.

Watch Now

Building a Security Policy

Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.

Watch Now

Designing with a Trusted Foundation

Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.

Watch Now

Hardening and Fortifying

You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.

Watch Now

Ongoing Threat Prevention

Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.

Watch Now

Putting It All Together

Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.

Watch Now

Security Assessment

Walk through a brief set of questions to see where you stand.

Take an assessment

More security questions?

Contact us