Home > Speakers >

Shawn Prestridge

Shawn Prestridge has served as Senior Field Application Engineer at IAR Systems since 2008 and became the US FAE Team Leader in 2019; he has been in the software industry since 1993. Before joining IAR Systems he worked as Embedded Hardware/Software Engineer and with Embedded Development. Shawn holds a BS in Electrical Engineering, a BS in Mathematics, an MS in Electrical Engineering, an MS in Software Engineering and a PhD in Electrical Engineering specializing in Quantum Cryptography, all with Southern Methodist University in Dallas.

Connecting CI, DevOps, and Security: What You Need to Know

Status: Available Now

Join Joe Schneider, and Shawn Prestridge to learn about continuous integration, DevOps and security approaches. Gain practical advice on implementing best practices into the embedded space (CI, embedded tools, orchestration platforms, compilers, security, developer efficiency and speed) and on how to prevent security issues from affecting your product. Hear from experts ranging from wireless (BLE, WiFi, Cellular), compiler, secure boot, toolchain, design, and testing to protect your products.

Go to Session


Why Should I Care About CI/CD?

Status: Available Now

Continuous Integration and Continuous Deployment (CI/CD) are all the rage today…but what does it actually mean and what can it really do for you? In this session, we’re going to talk about how it differs from traditional embedded development and what advantages CI/CD can give you, all backed up by research. We will show you how it can easily help you improve code quality and why, helping you to foreshorten your time-to-market. We’ll also tell you who all the major players are in CI/CD and finish the session by showing you how you can quickly get into the CI/CD game!

Go to Session


Live Q&A - Why Should I Care About CI/CD?

Status: Available Now

Live Q&A with Shawn Prestridge for the talk titled Why Should I Care About CI/CD?

Go to Session


The 1-Hour Security Bootcamp (2020)

Status: Available Now

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

Go to Session


Robust, Bare-Metal Security that works on any IoT Device (2020)

Status: Available Now

Are you looking to enable security on your IoT device but don’t really know where to start? This is the session for you! We will delve into the elements you need in an embedded design to establish security and explain why the components are necessarily. We will cover the differences between poor, “good enough”, and robust security and explain what you need to do to up your security game in your IoT device in simple, easy-to-follow steps. We will explain how to use a crypto toolbox to establish security fundamentals like: safe-and-secure boot, encrypted and authenticated communication, encrypted data storage, exploit detection/prevention, and more. Start your security journey here!

Go to Session