Shawn Prestridge
Connecting CI, DevOps, and Security: What You Need to Know
Status: Available NowJoin Joe Schneider, and Shawn Prestridge to learn about continuous integration, DevOps and security approaches. Gain practical advice on implementing best practices into the embedded space (CI, embedded tools, orchestration platforms, compilers, security, developer efficiency and speed) and on how to prevent security issues from affecting your product. Hear from experts ranging from wireless (BLE, WiFi, Cellular), compiler, secure boot, toolchain, design, and testing to protect your products.
Why Should I Care About CI/CD?
Status: Available NowContinuous Integration and Continuous Deployment (CI/CD) are all the rage today…but what does it actually mean and what can it really do for you? In this session, we’re going to talk about how it differs from traditional embedded development and what advantages CI/CD can give you, all backed up by research. We will show you how it can easily help you improve code quality and why, helping you to foreshorten your time-to-market. We’ll also tell you who all the major players are in CI/CD and finish the session by showing you how you can quickly get into the CI/CD game!
Live Q&A - Why Should I Care About CI/CD?
Status: Available NowLive Q&A with Shawn Prestridge for the talk titled Why Should I Care About CI/CD?
The 1-Hour Security Bootcamp (2020)
Status: Available NowHow do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.
Robust, Bare-Metal Security that works on any IoT Device (2020)
Status: Available NowAre you looking to enable security on your IoT device but don’t really know where to start? This is the session for you! We will delve into the elements you need in an embedded design to establish security and explain why the components are necessarily. We will cover the differences between poor, “good enough”, and robust security and explain what you need to do to up your security game in your IoT device in simple, easy-to-follow steps. We will explain how to use a crypto toolbox to establish security fundamentals like: safe-and-secure boot, encrypted and authenticated communication, encrypted data storage, exploit detection/prevention, and more. Start your security journey here!