Terms
© 2021 Wind River Systems, Inc.
/
Privacy
The world will compute mostly on the intelligent edge by 2030. With tens of billions of devices processing vast arrays of data across the intelligent edge — in motion in near-latency-free time — this data will be both immediately valuable and potentially vulnerable.
Listen to four of the world's leading security, governance, and cyber experts as they plot a pathway to a successful future where safe, secure, and cyber protected are common design elements in intelligent systems.
Presented by WIND RIVER
TUESDAY, May 18, 2021
9 am PT - 11 am PT
Security Summit 2021
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Explore Wind River Simics /
Explore Wind River Simics /
Security in the Mission-Critical Intelligent
Systems World
About the Summit
SESSION RECORDINGS
“The good news is, incredible technologies are becoming democratized and globally available – the challenging news is, incredible technologies are becoming democratized and globally available.”
— Dr. David Bray
Watch Session Recordings
Watch Now
Watch Now
Devices with high security requirements may take years to go from design to development, then spend a decade or more in the field. What can you do to make the security work you do today support the security needs this device will face in the future?
Secure Foundations: How to Build Devices to Be Security Resilient to Future Threats
Window Snyder,
Security Industry Veteran
+ Read Bio
Watch Now
Watch Now
The last two decades have demonstrated how the increasing democratization of data and tech holds great promise for humanity — and at the same time presents significant challenges in assuring the security, safety, and reliability of technological tools. Our decade ahead includes intelligent systems paired with humans. Consequentially, we must learn from the events of the last two decades and focus on future efforts ceyntered on baking-in resilience by design.
Learning from the Last Two Decades: Why We Must Bake-In Resilience by Design for Future Intelligent Systems
Dr. David Bray,
Inaugural Director, Atlantic Council GeoTech Center and Senior Fellow, Institute for Human-Machine Cognition
+ Read Bio
Watch Now
Watch Now
You cannot manage what you cannot measure. A common issue with cybersecurity is doing good things, but not the right things that really matter. Missing one key aspect is all it takes for an adversary to break in. In order to stay ahead of the adversary, it is important that companies have critical security metrics to identify what is and is not working. By having proper metrics integrated into a security dashboard, organizations can make the right decisions to protect and secure their critical assets.
Security Metrics
Dr. Eric Cole,
Founder, Secure Anchor Consulting
+ Read Bio
Watch Now
Watch Now
The 5G revolution brings about many well-known benefits, such as faster speeds, lower latency, and enhanced connectivity, built upon previous generations of technology. The shift in 5G architecture represents a shift like the one seen from traditional IT architecture to cloud computing. New 5G security features and technology and changes to wireless networks can improve data processing, device behavior, and IT controls — though there are some tradeoffs. With 5G expected to enable new applications in different industries, there is a need to ensure that business growth is aligned with security strategies, business processes and system impacts, critical infrastructure, governance and regulatory risk, network monitoring, and threat intelligence.
THE 5G REVOLUTION AND ITS SECURITY CHALLENGES AND OPPORTUNITIES
Wendy Frank,
Cyber 5G Leader and Principal, Deloitte Risk & Financial at Deloitte & Touche LLP
+ Read Bio
Watch Now
Watch Now
Listen to a spirited discussion among our guest speakers, moderated by Wind River Chief Product Officer Cyra Richardson.
Expert Panel: A Message of Influence
Cyra Richardson,
Chief Product Officer, Wind River
+ Read Bio
Rich Kellen has more than 25 years’ experience in technology and information security as a trusted business partner addressing the complexities of the ever-changing cybersecurity landscape. He is an experienced corporate leader with a history in bio-analytical, technical, and manufacturing industries. Prior to joining Wind River as Vice President and Chief Information Security Officer, Rich recently served as the CISO and Head of Infrastructure for Qorvo. Prior to Qorvo, he held numerous leadership roles of increasing responsibility at HP, Agilent, and Keysight Technologies. His final role was as Keysight’s Chief Information Security Officer. He also serves as an advisory board member for companies focused on information security and risk management and is an active member of several CISO and CIO forums.
Bio
Rich Kellen,
Chief Information Security Officer,
Wind River
+ Read Bio
Window Snyder is a security industry veteran and former Chief Security Officer at Square, Inc. She has previously held security leadership roles at Apple, Microsoft, Mozilla, Fastly, and Intel. A pioneer in the field of application security, she is the inventor of the methodology known as Threat Modeling, and the co-author of Threat Modeling, a manual for security architecture analysis in software.
BIO
Window Snyder,
Security Industry Veteran
Dr. David A. Bray has served in a variety of leadership roles in turbulent environments, including bioterrorism preparedness and response from 2000–2005, time on the ground in Afghanistan in 2009, as the non-partisan executive director for a bipartisan National Commission on R&D, and as a non-partisan federal agency senior executive. He accepted a leadership role in 2019 to incubate a new global Center with the Atlantic Council. He was also named a Senior Fellow with the Institute for Human-Machine Cognition in starting in 2018. Business Insider named him one of the top “24 Americans Who Are Changing the World” under 40 and he was named a Young Global Leader by the World Economic Forum for 2016–2021. From 2017 to the start of 2020, David served as executive director for the People-Centered Internet coalition chaired by internet co-originator Vint Cerf. He also was named a Marshall Memorial Fellow in 2018 and he was invited to work with U.S. Special Operation Command’s J5 Directorate on the challenges of countering misinformation and disinformation online. He has received both the Joint Civilian Service Commendation Award and the National Intelligence Exceptional Achievement Medal.
BIO
Dr. David Bray,
Inaugural Director, Atlantic Council GeoTech Center and Senior Fellow, Institute for Human-Machine Cognition
Dr. Cole is an industry expert with breadth and depth experience across integrated cybersecurity. He focuses on creating, enhancing, and solving complex problems by bridging the gap between a business and technology mindset, with a focus on security and innovation. A founder of Secure Anchor Consulting, a leading provider of cyber security solutions and services, he is an invited speaker and subject matter expert on SCADA and critical infrastructure cybersecurity. He has been a member of many key organizations, including the Commission on Cyber Security for the 44th President (25 industry experts), Purdue University Executive Advisory Board, and SME for the Nuclear Regulatory Commission.
BIO
Dr. Eric Cole,
Founder, Secure Anchor Consulting
Wendy Frank is the Cyber 5G Leader in the Cyber & Strategic Risk practice of Deloitte Risk & Financial Advisory. She focuses on providing cyber risk services to technology, media, and telecommunications industry clients, and is also part of the Cyber Internet of Things (IoT) offering. As a leader in product innovation, technology, and cybersecurity, she has counseled senior leadership at Fortune 500 companies and startups as well as government agencies for more than 25 years. She provides business-focused, results-oriented insights using her knowledge of products and technology, with a relentless focus on cybersecurity and privacy.
BIO
Wendy Frank,
Cyber 5G Leader and Principal, Deloitte Risk & Financial at Deloitte & Touche LLP
Cyra Richardson is responsible for product strategy and execution at Wind River, focused on driving digital transformation for our customers. She is a demonstrated technical entrepreneurial leader in AI, IoT, and embedded technology with several patents to her name. She spent more than 20 years at Microsoft where she served in a range of leadership roles, most recently as general manager of AI and IoT.
BIO
Cyra Richardson,
Chief Product Officer, Wind River
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Event Host
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Watch Now
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
Thank you for registering.
All videos are now accessible.
Click to start watching videos.