- This event has passed.
SBOM & Applying Best Practices in Cybersecurity for Constrained Devices with Zephyr
August 12 @ 9:00 am - 10:00 am
In the last year, the international community has recognized that there needs to be a focus on improving the cybersecurity of IoT devices. There has been guidance provided in Europe and the US last year, and a Biden executive order on “Improving Cybersecurity” this year. This isn’t just for desktops and servers though, sensors and actuators are part of the critical infrastructure that needs to be secure. This webinar will go through the best practices that the Zephyr project has adopted since the start of the project 5 years ago, and how it is able to meet the requirements of the recent guidance, including the creation of software bill of materials (SBOMs) when building images for constrained devices and managing vulnerability disclosures and support product makers.
The Zephyr Project partnered with Topio Networks to present a webinar “SBOM & Applying Best Practices in Cybersecurity for Constrained Devices with Zephyr” on Thursday, August 12 at 8-9 am PDT.
In this webinar you will learn:
– What does the Executive Order on Cybersecurity mean for the industry?
– What is SBoM and why is it important for Cybersecurity?
– What are the best practices for managing device security?
– How is cybersecurity for IoT devices evolving and how will it continue to evolve?
To register, visit the Topio Networks main event page here.