2-Part Series: Security and the DevSecOps Approach

Part 1:  Unlocking Hardware Security Through Software

Join us to examine three primary processor architectures — NXP PPC, Intel , and Xilinx ARM — and the available hardware-based security features each includes, including their advantages and restrictions.

Attendees will learn about:

  • Built-in security features for each processor architecture
  • Augmentation needed from software-based security features
  • The impact of FIPS 140-2 certification needs and quantum computing
  • Security features including secure boot, trusted boot, cryptographic processor algorithms, attestation, random number generation, secure key storage, physical tamper monitoring, and JTAG protection

Part 2: Security and the DevSecOps Platform: Approaches, Methods, and Tools

DevOps is enabling faster deployment of more secure software to devices by tightly coupling development and operations functions. However, to ensure security, the DevOps pipeline itself must be secure.

Attendees will learn about:

  • New security approaches for the emerging intelligent edge
  • Methods for full lifecycle security for mission-critical systems
  • The impact of FIPS 140-2 certification needs and quantum computing
  • Must-have development tools for security validation
  • Lessons learned in the journey to build security into a DevSecOps environment

Register for one or both sessions today!