End-to-End IoT Security: From Legislation to IP Protection to Secure Boot

July 21, 2020 Rich Nass

Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?

Join this five-part IoT security webinar series to discover the answer to that question, as well as how IAR C-Trust and the Embedded Workbench development environment can help you join that four percent. 

Sessions include:

Register today for free and learn how to secure your electronic systems from inception through deployment.

About the Author

Rich Nass

Richard Nass is the Executive Vice-President of OpenSystems Media. His key responsibilities include setting the direction for all aspects of OpenSystems Media’s Embedded and IoT product portfolios, including web sites, e-newsletters, print and digital magazines, and various other digital and print activities. He was instrumental in developing the company's on-line educational portal, Embedded University. Previously, Nass was the Brand Director for UBM’s award-winning Design News property. Prior to that, he led the content team for UBM Canon’s Medical Devices Group, as well all custom properties and events in the U.S., Europe, and Asia. Nass has been in the engineering OEM industry for more than 25 years. In prior stints, he led the Content Team at EE Times, handling the Embedded and Custom groups and the TechOnline DesignLine network of design engineering web sites. Nass holds a BSEE degree from the New Jersey Institute of Technology.

Follow on Twitter Follow on Linkedin Visit Website More Content by Rich Nass
Previous Article
Dev Kit Weekly: ADLINK I-Pi Industrial IoT Prototyping Platform
Dev Kit Weekly: ADLINK I-Pi Industrial IoT Prototyping Platform

While maker boards like Arduino and Raspberry Pi are great because of their ultra-low cost, they are, well,...

Next Article
Seamlessly Integrate Security into Your Embedded Development Workflow

In this series of five webcasts, we’ll run through the five key security-related problems that will impact ...