Presented by:
Ed Adams
Executive Officer, Security Innovation
Gwyn Fisher
Chief Technology Officer, Klocwork
Peter Jenney
Vice President, Strategic Technology Initiatives
Security Innovation
 
Live at:
December 12 at 1pm ET
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.  However, there are profound security implications as the software running therein must be completely fault-tolerant and hardened from attack. 
 
This webcast, delivered by three seasoned professionals in the application security and embedded space, will describe the inherent security challenges of embedded systems, and provide best practices for protecting sensitive data. Embedded software engineers and security specialists attending this webinar will learn about:
  • Common Attacks, Threats  and Security Considerations for embedded software
  • Using static analysis to find and fix security vulnerabilities  
  • Application Whitelisting – preventing malware and unauthorized changes
  • Employing threat modeling as a defensive measure against security threats
About the Presenters:
Ed Adams is a software executive with successful leadership experience in the IT security and quality assurance industries. As CEO, Mr. Adams applies his security and business skills, as well as his pervasive industry experience in the software quality space, to direct application security experts to help organizations identify and mitigate risks in their software applications.
Gwyn Fisher is the chief technology officer at Klocwork and has more than 20 years of global technology experience. He brings a valuable combination of vision, experience, and direct insight into the software developer's perspective. At Klocwork, Gwyn returns to his original passion, compiler theory, to move static source code analysis to the next level.
Peter Jenney brings more than 20 years of high-tech experience to Security Innovation where he leads all strategic initiatives for the firm's cutting edge research, products, and consulting services. He works closely with Security Innovation's senior management, engineering and business development teams, as well as the company's business partners to identify new opportunities that will further diversify the company's product portfolio and penetrate new markets in both the government and commercial sectors.

Thank you,

IEEE Computer Society
Register now to reserve your seat.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.
This field is mandatory.