2021 Summer Security Training Series

Learn how to secure your embedded system with the experts at Star Lab, the Wind River cybersecurity and technology protection group.

It’s not a fair fight.
When attacking an embedded system, it takes only one vulnerability to lead to an exploit. Join Wind River security experts for a deeper-dive training on the specific steps necessary to secure your embedded systems, using 10 essential principles. We’ll offer practical guidance in how to prepare your system for a rapidly evolving threat landscape, and you’ll get a chance to ask our technical experts your most pressing security questions.


Container Security
Containerized applications are expected to grow by 29% by 2026 — but 60% of security professionals surveyed reported security incidents with their container usage (ResearchAndMarkets, 2021). Containerization of code helps mitigate such attacks and prevents an exploit of any one component from affecting others.
What you will learn:
• How containerization affects (and doesn’t affect) application and systems security
• The benefits of containerization on secure embedded systems
• How even exploited software can be constrained to limit the reach of an attacker

Preventing Zero-Day Attacks with Allow-Listing
In 2020, 18,325 total common vulnerability exposures (CVEs) were reported. This number marks an annual increase that is expected to continue for the foreseeable future.
There is no silver bullet for addressing CVEs or ensuring a secure system. Each CVE and common weakness enumeration (CWE) must be evaluated independently to ensure that system design objectives are being met and to determine the appropriate mitigation tools.
What you will learn:
• Classes of CVEs and how zero-day attacks affect live systems
• Specific security techniques and technologies that can prevent various classes of zero-day attacks
• How to protect embedded systems from attack, even if the attacker has already exploited the system

Secure OS
97% of risk management professionals said they believed unsecured IoT devices could be open to a “catastrophic” security breach (Ponemon Institute, 2018).
Traditional embedded OSes have limited protections between processes and application/system dependencies. A large attack surface enables a single exploit to compromise the integrity of the entire system. Learn how to implement Linux securely on an embedded system.
What you will learn:
• How to harden your embedded operating system
• How to reduce the attack surface by removing code and interfaces that are not absolutely required
• How to leverage defense in depth on your embedded device

Secure Boot
Of information security professionals surveyed, 53% believe it likely their enterprise will experience a cyberattack in the next 12 months (ISACA 2020).
Boot attacks are a common method used to enable unauthorized applications and system modifications. Learn how to ensure a well-engineered secure boot sequence from the experts at Star Lab, the Wind River cybersecurity and technology protection group.
What you will learn:
• A strong, secure boot sequence to maintain system integrity and authenticity
• Commonly available secure boot technologies and the pros and cons of each
• Proper storage and release of crypto keys in a secure boot sequence

Secure Hypervisor
The edge/embedded hypervisor market is projected to grow to $197.6M in 2024, at a CAGR of 7.1% (VDC Research 2020).
As adoption of virtualization increases, hypervisors help optimize the underlying hardware’s resources and functionality. Find out why embedded virtualization can be more performant and more secure than enterprise-level virtualization.
What you will learn:
• The performance implications of embedded virtualization
• How embedded virtualization enhances security
• How to secure your own embedded system with high-performance virtualization

Understanding and Meeting Cybersecurity Requirements
The global market for industrial cybersecurity software and services will surpass $1.25B by 2025 (VDC Research). But even as organizations move to address their cybersecurity needs, meeting the necessary requirements raises new demands. Learn about requirements challenges and solutions from the experts at Star Lab, the Wind River cybersecurity and anti-tamper group.
What you will learn:
• Specifics of meeting security requirements for different industries
• Significant overlaps among requirements that can mitigate delays and cost increases
• Solutions for meeting security requirements quickly and cost-effectively