Thursday, July 14, 2016

You are invited: One-day cybersecurity workshop - Learn about your security risks from the leading experts




ESCRYPT – Embedded Security is a leading system provider for embedded security world-wide. ESCRYPT offers protection for various embedded systems and corresponding infrastructures and keeps your systems and products safe and secure.  ESCRYPT is a 100% subsidiary of ETAS and occasionally guest-blogs here.


 

"There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: Those that have been hacked and will be again."
-Robert Mueller, sixth director of the FBI








Don't Become a Statistic: Attend the one-day ESCRYPT Cybersecurity training workshop, taking place December 9, 2016 in San Jose, CA.

The only way to avoid being part of this statistic is to learn as much as possible about the risks that exist in your company's environment. Do you know the security risks of the embedded systems you work with?  After completing the ESCRYPT workshop, you will be able to determine which risks may exist for your organization and your products as they coexist within the internet of things (IoT). Whether your device communicates with the cloud or other embedded devices, you need to understand cybersecurity to protect your data from intrusion. With the sophistication of attacks consistently increasing it is imperative that you are educated on the risks.


Agenda:

9:00 AM: Overview of modern cyber attacks
This section is a discussion on a selection cyber attacks from the past decade and their repercussions. Attacks will include the Charlie Miller and Chris Valasek's wired and wireless attacks, BMW's keyless entry system, University of Michigan's attack on implantable cardiac defibrillators (ICD) and artificial pacemakers.

10:15 AM: Break

11:00 AM: Basic Cryptographic Terminology 
This section will include cryptographic keys, symmetric and asymmetric cryptography, hash functions, message authenticated codes (MAC), digital signatures, (CIA) confidentiality, integrity and availability, and a discussion on the relevant/applicable use cases. 

12:00 PM: Lunch

1:00 PM: Introduction to Hardware Security Modules 
Concept and overall architecture of a hardware security module, i.e. TPM: trusted platform module, SHE: security, hardware extension and HSM: hardware security module. Relevant use cases for hardware security modules, and why they are important. Proprietary solutions are also discussed. 

2:30 PM: Risk Assessment Methodology and Outcomes 
Overall methodology of conducting a risk assessment with an emphasis on the "Common Criteria for Information Technology Security Evaluation." This section will consider the attack potential versus the damage potential and the potential outcomes of a risk assessment. 

3:00 PM: Break

4:00 PM: Embedded Cybersecurity Use Cases
Use cases of cryptographic functions, hardware security modules etc. in relation to secure debugging, and secure software/firmware over the air. Secure CAN communication, secure boot and intrusion detection systems will also be discussed. 
When: December 9, 2016, 9:00 am
Where: Hyatt Place, 282 Almaden Blvd, San Jose, CA 95113
Registration: To register, please complete the registration form on the ETAS Training Page (click on the Cyber Security class date to get started).

If you have any additional questions, or to find out if the ESCRYPT Embedded Cybersecurity Training Workshop is for you, please contact Stephanie.

The ESCRYPT Embedded Cybersecurity Workshop comes to you in cooperation with Utimaco.