Mitigating M2M Security Risks in Critical Embedded Systems

MessageThis Webinar is over
Date Dec 12, 2013
Time 01:00 ET
Cost Free
Date – Thursday, December 12 at 1pm ET

Time -  12 at 1pm ET

Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.  However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. 
This webcast, delivered by three seasoned professionals in the application security and embedded space, will describe the inherent security challenges of embedded systems, and provide best practices for protecting sensitive data. Embedded software engineers and security specialists attending this webinar will learn about:
·         Common Attacks, Threats  and Security Considerations for embedded software
·         Using static analysis to find and fix security vulnerabilities  
·         Application Whitelisting – preventing malware and unauthorized changes
·         Employing threat modeling as a defensive measure against security threats

About the Presenters-
Ed Adams is a software executive with successful leadership experience in the IT security and quality assurance industries. As CEO, Mr. Adams applies his security and business skills, as well as his pervasive industry experience in the software quality space, to direct application security experts to help organizations identify and mitigate risks in their software applications.
Gwyn Fisher is the chief technology officer at Klocwork and has more than 20 years of global technology experience. He brings a valuable combination of vision, experience, and direct insight into the software developer's perspective. At Klocwork, Gwyn returns to his original passion, compiler theory, to move static source code analysis to the next level.
Peter Jenney brings more than 20 years of high-tech experience to Security Innovation where he leads all strategic initiatives for the firm's cutting edge research, products, and consulting services. He works closely with Security Innovation's senior management, engineering and business development teams, as well as the company's business partners to identify new opportunities that will further diversify the company's product portfolio and penetrate new markets in both the government and commercial sectors.

Webinar URL -
About IEEE Computer Society
IEEE Computer Society is the world's leading computing membership organization and the trusted information and career-development source for a global workforce of technology leaders including: professors, researchers, software engineers, IT professionals, employers, and students. The unmatched source for technology information, inspiration, and collaboration, the IEEE Computer Society is the source that computing professionals trust to provide high-quality, state-of-the-art information on an on-demand basis. The Computer Society provides a wide range of forums for top minds to come together, including technical conferences, publications, and a comprehensive digital library, unique training webinars, professional training, and the TechLeader Training Partner Program to help organizations increase their staff's technical knowledge and expertise, as well as the personalized information tool myComputer. To find out more about the community for technology leaders, visit

Thank you,
IEEE Computer Society


comments powered by Disqus
Create your own event
Turn your passion into a business.
Join our mailing list