• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Publications
  • /Tech News
  • /Events
  • Home
  • / ...
  • /Tech News
  • /Events

Explore the "New Normal" in Hardware Security

Join us for this engaging webinar on the new risks, opportunities, and possible roadmaps for researchers in the field of hardware security during Covid-19

How Can Hardware Security Contribute to the Fight Against COVID-19 and to Post Pandemic Life?HOSTwebinar_IconHOSTwebinar_Icon Join us on Tuesday, 28 July at 10-11:30 MST (12-1:30 EST) to find out! The COVID-19 pandemic has had unprecedented and widespread impacts on the economy, travel, politics, education, research, and human social lives in 2020. It is widely agreed that technology will play a critical role (both short-term and long-term) in mitigating the spread of the COVID-19 and establishing a “new normal”. Personal protective equipment (PPE) is minimizing exposure to virus. Social distancing is being maintained through remote work, education, and health services, online retail, and on-demand food delivery. Scalable methods for fever screening and contact tracing are being developed to quickly identify the infected, warn patient contacts of exposure, and break chains of virus transmission. In the post-pandemic world, some of these ‘best’ practices may continue while new ones (e.g., contact-less everything, robot/drone delivery, etc.) emerge. Confidence in the hardware is important because of the impact of the threat. The new normal and upcoming practices/technologies have opened up the door to unfamiliar security and privacy issues. During this webinar, the moderator and panelists will discuss some of the risks, opportunities, and possible roadmaps for researchers in the field of hardware security to address them. Panelists:
  • Sae Woo Nam, National Institute of Standards and Technology
  • Will Zortman, Sandia National Laboratories
  • James Joshi, National Science Foundation
  • Jim Plusquellic, University of New Mexico
  • Rob Aitken, ARM
And moderator: Saverio Fazzari, Booz Allen Hamilton Topics: The panel will primarily focus on the following topic areas and questions:
  • Data Privacy: How secure are the devices being used for contact tracking, health monitoring, online shopping, etc.? How to avoid being tracked outside the workplace? How to protect against unauthorized access to my tracking and health information? How should such data be stored and for how long?
  • Data Transmission: During teleconferences, how should audio and video be protected efficiently in hardware? How can unwanted intrusions (i.e., Zoom bombing) be prevented? How to enforce digital rights management?
  • User Authentication: How should organizations provide access control for employees working from home, especially on security/IP sensitive tasks? How to verify who we are really talking to? What features need to be present in the hardware to support authentication, e.g., fingerprints, facial recognition, voice recognition, other biometrics?
  • Supply Chain/Counterfeit: Are front-line workers, state governments, etc. getting genuine, PPE, medicine, vaccines? How can hardware security prevent price-gouging, and enable independence of international suppliers?
  • Hardware Trust: Can the hardware built on top of low-cost embedded systems used for pandemic and post-pandemic technologies/practices (e.g., contact tracing, telework, telehealth, etc.) be trusted? How can hardware security make such hardware more trustworthy, and how can that trust be quantified?
You don't want to miss this webinar! We look forward to seeing you on Tuesday, 28 July at 10-11:30 MST (12-1:30 EST). REGISTER TODAY
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. IEEE HOST 2020 Rescheduled – Now Taking Place December 6-9, 2020 LEARN MORE HERE
LATEST NEWS
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Computing’s Top 30: Sukanya S. Meher
Computing’s Top 30: Sukanya S. Meher
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

Shaping the Future of HPC through Architectural Innovation and Industry Collaboration

Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence

Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success

Computing’s Top 30: Sukanya S. Meher

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age