WEBINAR DETAILS
  • When
  • About
    From the earliest stages of hardware and firmware development, engineers will need to consider secure boot, secure update mechanisms, and encryption as default — and it also affects the selection of processors, operating systems, and third-party libraries, since components that lack long-term support may become non-compliant by default. This session is the engineering deep-dive: how to architect CRA-compliant embedded systems from day one. Topics include hardware roots of trust and secure boot implementation, secure OTA firmware update design, SBOM generation and vulnerability management workflows, and more.

    This session is part of our “CRA Virtual Conference". Registration/event page here.
  • Duration
    1 hour
  • Price
    Free
  • Language
    English
  • OPEN TO
    Everyone
  • Dial-in available
    (listen only)
    Not available.
FEATURED PRESENTERS