Terms
Privacy
/
© 2021 Wind River Systems, Inc.
DESIGNING SECURITY FOR INTELLIGENT SYSTEMS
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Explore VxWorks /
Explore VxWorks /
The annual cost of cybercrime to the global economy is predicted to reach $10.5T by 2025 (Cybercrime Magazine, 2020).
Episode 1 - Linux and VxWorks: OS Options for Edge Use Cases
Episode 2 - Robots Get Real “Time” Running TSN Applications on VxWorks
Episode 3 - Deploying Containers in a VxWorks World
PART 2: SECURITY FOR THE INTELLIGENT EDGE
Steve Hart, Security Product Management, Wind River
The U.S. Department of Defense plans to spend $9.8 billion on cybersecurity this year — up 81% from its 2020 request, according to Military & Aerospace Electronics.
How to architect security for the intelligent edge
What you will learn:
How to anticipate, model, and monitor different threat scenarios
How to select applicable security controls and features
®
Episode 1 - Linux and VxWorks: OS Options for Edge Use Cases
Episode 2 - Robots Get Real “Time” Running TSN Applications on VxWorks
Episode 3 - Deploying Containers in a VxWorks World
Register for Upcoming Events
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to attend
Thank you for registering
You will receive a confirmation email shortly with details.
Register for Upcoming Events
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
Thank you for registering.
Your video will open shortly in a window on top of this page.
If the video closes, click here.
Thank you for registering.
Your video will open shortly in a window on top of this page.
If the video closes, click here.
Join Wind River security experts for a two-part series about the pathway to a successful cybersecurity future with intelligent systems.
July 27 & 28, 2021
8 a.m. PT
Intelligent systems and devices may take years to go from design to development, then spend a decade or more in the field. What security mechanisms can you put in place today to mitigate future risk from malicious threats?
Examples of security implementation
A systematic approach to evaluating security
How the CIA triad functions as a security framework
What you will learn:
Identifying assets and ensuring that they are protected now and in the future is a critical requirement. A systematic evaluation approach is essential.
Companies that successfully navigate cyberthreats are twice as successful as others in their segments (Forbes Intelligent Systems Research, May 2021).
Kevin Jonestrask, Principal Technologist, Wind River
PART 1: SECURITY BEFORE THE FIRST LINE OF CODE
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
July 27 | 8 a.m. PT
July 28 | 8 a.m. PT
Learn from Wind River security experts about the specific cybersecurity needs of intelligent systems, and the steps you can take to address them. We’ll offer practical guidance, and you’ll be able to ask our experts your most pressing security questions.
WIND RIVER On-Demand
Web Seminar
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand
Watch on Demand