IoT security: evolution not revolution

  • Overview of security advances over the past 20 years and the security challenges facing embedded device developers
  • How to adapt and apply the security approaches used in IT to deeply embedded resource-constrained environments
  • Understanding of the resource constraints and intermittent connectivity of embedded devices applied to embedded and critical infrastructure use casesNo session abstract is available at this time.
Data Security Data Security

Presentation Date

Tuesday, October 15, 2013 - 15:00



Presentation PDF