A Practical Approach to Designing and Maintaining Security for Open Source Based Products
A Practical Approach to Designing and Maintaining Security for Open Source Based Products
Session Description:
Secure boot, chain of trust, and trusted execution environment are some of the key components in securing a product. Security vulnerabilities being reported against these components are increasing each year, and a single vulnerability can break the chain of trust. This presentation will go over the industry best practices for designing secure products and maintaining that security posture over time without hampering product performance.
Logesh Kolandavel
Have questions about secure boot, chain of trust, and trusted execution environment, and want to meet with Logesh while at Embedded DevCon? Feel free to reach out to him directly.
Could you benefit from a personalized security demo?
Simply fill out the form or email us at sales@timesys.com, and we will be in touch within one business day to schedule a date and time that works for you. Or you can call us at 1.866.392.4897 (toll-free) or +1.412.232.3250.
* Denotes required field.