Webcast

Sponsored by: Wind River
Sep 26, 2020 8AM EDT(3 years, 6 months ago)
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access. 
Presented by: Arlen Baker (Principal Technologist, Wind River)