RTOSs can still play an important role in TrustZone applications. So how does a developer use an RTOS when there is a secure and unsecure world executing on the processor? In this session, we will explore several different options developers leverage to use an RTOS in a TrustZone application. Attendees will walk away with an understanding on what considerations they need to make and they methods they can employ to use a RTOS.