Of information security professionals surveyed, 53% believe it likely their enterprise will experience a cyber-attack in the next 12 months (ISACA 2020).
Boot attacks are a common method used to enable unauthorized applications and system modifications. Learn how to ensure a well-engineered secure boot sequence from the experts at Star Lab, the Wind River cybersecurity and technology protection group.
What you will learn:
- A strong, secure boot sequence to maintain system integrity and authenticity
- Commonly available secure boot technologies and the pros and cons of each
- Proper storage and release of crypto keys in a secure boot sequence
Speaker
Johnathan Kline
Chief Technology Officer
Star Lab
A Wind River Company
Mike Mehlberg
VP of Marketing
Star Lab
A Wind River Company