Mitigating M2M Security Risks in Critical Embedded Systems
Date – Thursday, December 12 at 1pm ET
Time - 12 at 1pm ET

Upcoming SlideShare
Loading in …5

Mitigating M2M Security Risks in Critical Embedded Systems


Published on

Join us for this webinar featuring insights from Ed Adams, Gwyn Fisher, Peter Jenney on Dec 12, 2013, at 1pm ET on Mitigating M2M Security Risks in Critical Embedded Systems.

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Mitigating M2M Security Risks in Critical Embedded Systems

  1. 1. Mitigating M2M Security Risks in Critical Embedded Systems Date – Thursday, December 12 at 1pm ET Time - 12 at 1pm ET Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates. However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. This webcast, delivered by three seasoned professionals in the application security and embedded space, will describe the inherent security challenges of embedded systems, and provide best practices for protecting sensitive data. Embedded software engineers and security specialists attending this webinar will learn about:  Common Attacks, Threats and Security Considerations for embedded software  Using static analysis to find and fix security vulnerabilities  Application Whitelisting – preventing malware and unauthorized changes  Employing threat modeling as a defensive measure against security threats About the PresentersEd Adams is a software executive with successful leadership experience in the IT security and quality assurance industries. As CEO, Mr. Adams applies his security and business skills, as well as his pervasive industry experience in the software quality space, to direct application security experts to help organizations identify and mitigate risks in their software applications. Gwyn Fisher is the chief technology officer at Klocwork and has more than 20 years of global technology experience. He brings a valuable combination of vision, experience, and direct insight into the software developer's perspective. At Klocwork, Gwyn returns to his original passion, compiler theory, to move static source code analysis to the next level. Peter Jenney brings more than 20 years of high-tech experience to Security Innovation where he leads all strategic initiatives for the firm's cutting edge research, products, and consulting services. He works closely with Security Innovation's senior management, engineering and business development teams, as well as the company's business partners to identify new opportunities that will further diversify the company's product portfolio and penetrate new markets in both the government and commercial sectors. Webinar URL - Sponsored by – About IEEE Computer Society IEEE Computer Society is the world's leading computing membership organization and the trusted information and careerdevelopment source for a global workforce of technology leaders including: professors, researchers, software engineers, IT professionals, employers, and students. The unmatched source for technology information, inspiration, and collaboration, the IEEE Computer Society is the source that computing professionals trust to provide high-quality, state-of-the-art information on an ondemand basis. The Computer Society provides a wide range of forums for top minds to come together, including technical conferences, publications, and a comprehensive digital library, unique training webinars, professional training, and the TechLeader Training Partner Program to help organizations increase their staff's technical knowledge and expertise, as well as the personalized information tool myComputer. To find out more about the community for technology leaders, visit REGISTER NOW ©2013 IEEE Computer Society