Securing connected devices begins far sooner than most think, and extends far beyond the job of a single engineer or company. Even in systems that utilize robust components, vulnerabilities can present themselves as early as the semiconductor manufacturing stage and persisit throughout firmware development, application programming, and connecting devices to networks.