Mitigating M2M Security Risks in Critical Embedded Systems

Mitigating M2M Security Risks in Critical Embedded Systems

 

Available On Demand
Duration 60minutes
Speakers
Edward Adams
Chief Executive Officer
Security Innovation
Edward Adams
Ed Adams is a software executive with successful leadership experience in the IT security and quality assurance industries. As CEO, Mr. Adams applies his security and business skills, as well as his pervasive industry experience in the software quality space, to direct application security experts to help organizations identify and mitigate risks in their software applications.
Paul Paget
Chief Executive Officer
Savant Protection
Paul Paget
A veteran of the information security industry, Paul brings to Savant Protection 30 years of high tech experience and successful track record in growing and guiding security software companies. Previously, Paul served as President and CEO of Core Security Technologies where he successfully built Core into the market leader in automated penetration testing.
Gwyn Fisher
Chief Technology Officer
Klocwork
Gwyn Fisher
Gwyn Fisher is the chief technology officer at Klocwork and has more than 20 years of global technology experience. He brings a valuable combination of vision, experience, and direct insight into the software developer’s perspective. At Klocwork, Gwyn returns to his original passion, compiler theory, to move static source code analysis to the next level.
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.
 
However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack.

Join this webinar to learn about:
  • Common attacks, threats  and security considerations for embedded software
  • Using static analysis to find and fix security vulnerabilities  
  • Application whitelisting – preventing malware and unauthorized changes
  • Employing threat modeling as a defensive measure against security threats  
Register Now.
Already a member? Login