Now you can earn IEEE Professional Development Hours by attending CEC courses.

April 21 - Day 2 - Performing a Security Threats Analysis

CEC Semester Seventeen 2020
April 21, 2020 - 2:00pm EDT

One common mistake that teams often make when attempting to secure their systems is to try to bolt security on at the end. A security threats analysis must be performed early in the development cycle in order to appropriately identify the assets that will be protected, the threats those assets face and develop the requirements that will result to select the right hardware-based security solution. In this session, we are going to explore how to perform a security threats analysis that will result in security requirements for an example IoT device. Attendees will walk away with an understanding how to perform such an analysis on their systems.

You must be logged in to view this page.