Cybersecurity For The Intelligent Edge

July 12, 2021

Cybersecurity For The Intelligent Edge

As Matt Jones, VP of Engineering at Wind River®, puts it, “You can have a secure system that is not safety critical, but you cannot have a safety-critical system that isn’t secure.” 

But where does that leave IoT engineers developing safety-critical intelligent edge systems? For many, security is a foreign discipline that has suddenly become central to the way they design, build, and code.

This seven-part miniseries reveals seven steps to developing and deploying secure systems that will resist cyberthreats throughout the lifecycle. Join Arlen Baker, principal security architect at Wind River, for a fast-paced look at how to design cybersecurity into the intelligent edge.

  • The Cybersecurity Journey Through the Full Product Lifecycle: Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of the journey.
  • Capturing Use Case Security Requirements: Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
  • Building a Security Policy: Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
  • Designing with a Trusted Foundation: Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
  • Hardening and Fortifying: You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.
  • Ongoing Threat Prevention: Securing your device or system is a complete lifecycle effort. Threats must be actively monitored, and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.
  • Putting It All Together: Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.

Register here to gain access to seven-part web seminar.

Featured Companies