IAR Systems

Containerized, cloud-enabled, and compliant: embedded DevSecOps at scale
As embedded systems evolve and development scales across teams and geographies, maintaining quality, security, and compliance becomes a serious challenge. Manual workflows and fragmented toolchains no longer meet the demands of modern product development, especially when time-to-market and regulatory readiness are critical.
In this session, we’ll explore how engineering teams are implementing DevSecOps best practices to automate embedded CI/CD pipelines, reduce risk, and deliver secure, high-quality software, whether deploying in cloud, hybrid, or on-prem environments.
You’ll learn how containerized, cloud-enabled workflows help:
- Support compliance with standards like ISO 26262, IEC 61508, and IEC 62304 using TÜV-certified tools
- Integrate secure boot, encryption, and IP protection directly into development pipelines
- Adopt architecture-agnostic toolchains across Arm, RISC-V, and more, minimizing vendor lock-in
- Enable CI/CD automation using familiar tools like GitHub, GitLab, Kubernetes, and containers
Whether you're building safety-critical devices or scaling across multiple product lines, this session offers real-world strategies that embedded software teams are using today to modernize, secure, and accelerate development across any deployment model.
The 1-Hour Security Bootcamp
How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.