Terms
Privacy
/
© 2021 Wind River Systems, Inc.
EXECUTIVE BRIEF: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
EXECUTIVE BRIEF: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
WHITE PAPER: Cybersecurity and Secure Deployments
WHITE PAPER: Cybersecurity and Secure Deployments
WHITE PAPER: Software Security Across the Intelligent Edge
WHITE PAPER: Software Security Across the Intelligent Edge
Want to learn more?
Explore related resources.
Speaker:
How to transform security from an afterthought into your corporate identity and strength
How to scale your digital transformation efforts securely and network new assets knowing that they are protected from cyberthreats
How to use advanced simulation techniques to test for vulnerabilities, detect unauthorized system use, and turn your attack analysis into a security strategy
What you will learn:
It's hard to test software in today's complex business environments. Hackers know this — they target systems that were designed to operate in isolation but are now networked. In fact, in 2020, cyber incidents ranked as the most important business risk in the Allianz Risk Barometer.
Does this sound like your enterprise? Are you responsible for finding a solution to security threats? We can help. There are modern tools that can test system environments, ensure that they are properly secured, and provide your team the confidence to work intelligently during the day and sleep peacefully at night.
Of course, these tools can take a little time to learn. Join us for a demonstration of how to use a honeypot concept to test for an intelligent edge attack surface. You'll also learn:
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch on-demand
WIND RIVER On-Demand
Web Seminar
Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success.
Turning Your Cyberattack Vulnerabilities into a Smart Security Strategy
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Learn more about Simics /
Learn more about Simics /
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
With two decades of experience securing industrial facilities, a license as a Scrum Master, and an educational background in both engineering and philosophy, James Hui has a proven track record of assisting industry-leading customers in their security transformation.
BIO
James Hui,
Senior Solutions Architect, Wind River
James Hui
Senior Solutions Architect, Wind River
+ Read Bio
EXECUTIVE BRIEF: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
EXECUTIVE BRIEF: Cybersecurity, IoT, and Embedded Systems: Reducing Risk with Pen Testing
WHITE PAPER: Cybersecurity and Secure Deployments
WHITE PAPER: Cybersecurity and Secure Deployments
WHITE PAPER: Software Security Across the Intelligent Edge
WHITE PAPER: Software Security Across the Intelligent Edge
Want to learn more?
Explore related resources.
WIND RIVER On-Demand
Web Seminar
Thank you for registering.
Your video will open shortly in a window on top of this page.
If the video closes, click here.
Thank you for registering.
Your video will open shortly in a window on top of this page.
If the video closes, click here.