BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Zephyr Project - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://zephyrproject.org
X-WR-CALDESC:Events for Zephyr Project
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210812T090000
DTEND;TZID=America/Los_Angeles:20210812T100000
DTSTAMP:20260416T101117
CREATED:20210803T155338Z
LAST-MODIFIED:20210803T155338Z
UID:10000023-1628758800-1628762400@zephyrproject.org
SUMMARY:SBOM & Applying Best Practices in Cybersecurity for Constrained Devices with Zephyr
DESCRIPTION:In the last year\, the international community has recognized that there needs to be a focus on improving the cybersecurity of IoT devices. There has been guidance provided in Europe and the US last year\, and a Biden executive order on “Improving Cybersecurity” this year. This isn’t just for desktops and servers though\, sensors and actuators are part of the critical infrastructure that needs to be secure. This webinar will go through the best practices that the Zephyr project has adopted since the start of the project 5 years ago\, and how it is able to meet the requirements of the recent guidance\, including the creation of software bill of materials (SBOMs) when building images for constrained devices and managing vulnerability disclosures and support product makers. \nThe Zephyr Project partnered with Topio Networks to present a webinar “SBOM & Applying Best Practices in Cybersecurity for Constrained Devices with Zephyr” on Thursday\, August 12 at 8-9 am PDT. \nIn this webinar you will learn:\n– What does the Executive Order on Cybersecurity mean for the industry?\n– What is SBoM and why is it important for Cybersecurity?\n– What are the best practices for managing device security?\n– How is cybersecurity for IoT devices evolving and how will it continue to evolve? \n \nTo register\, visit the Topio Networks main event page here.
URL:https://zephyrproject.org/event/sbom-applying-best-practices-in-cybersecurity-for-constrained-devices-with-zephyr/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://zephyrproject.org/wp-content/uploads/2021/08/E7x6wCoVUAEQwwW.jpg
END:VEVENT
END:VCALENDAR