September 6th, 2018 @ 11:00 AM PT
This webinar will discuss the following:
• What is a Hardware Root of Trust? How is it used today?
• What sort of system-level security issues arise when a Hardware Root of Trust is not correctly configured or not correctly integrated into the system?
• How do we verify our Hardware Root of Trust to be secure? What are the best known methods to analyze both the hardware and the software together?
• Live question and answer session
To sign up, please click on the button.