Welcome Guest

Strong Security for Smart Factories

Original Air Date: May 19, 2016 Webinar
0
0 0 View


    Please disable any pop-up blockers for proper viewing of this webinar.

More Info Less Info

Smart factories rely on networked industrial environments, which promise huge efficiency gains and customized production capabilities. However, automated communication between cyber-physical systems also poses significant threats and risks to suppliers as well as customers.

This webinar starts off by giving you an overview of the security challenges facing smart factories, going on to introduce protection concepts for industrial devices such as routers, PLCs and industrial PCs. It winds up with real-world solutions that show you how to secure authentication and protect the integrity of your industrial devices.

Attend this webinar to learn about:

  • About common security threats facing smart factories
  • How hardware-based security enables strong protection of industrial automation systems
  • About implementation concepts for secured authentication and protection of device integrity
Who should attend?
Design engineers, system architects and product managers involved in device and system design for industrial automation systems

Speaker

Dr. Josef Haid, Principal Technical Marketing, Infineon Technologies

Dr. Josef Haid studied Electrical Engineering and received a Dr.-Ing. degree in 2003 from Graz University of Technology, Austria. He started his professional career at Austriamicrosystems and joined Infineon in 2004 as a concept engineer for security controllers. In the following years Dr. Haid held different positions in concept engineering and technical marketing for contactless security controllers used in payment and government ID applications. Since 2015 Dr. Haid leads the technical marketing group of the Platform Security business line focusing on hardware security in embedded devices for IoT, industrial, and consumer electronics. Dr. Haid's interests include architectures of security ICs as well as in exploitation of security concepts for emerging applications.

Please Login

You will be redirected to the login page

×
Please Login

You will be redirected to the login page

×
Please Login

You will be redirected to the login page