Microchip South Asia Shields UP! Security Webinar Series

Join our security experts and partners as we provide a series of security-themed webinars designed to raise your awareness of security vulnerabilities and discuss leading-edge solutions to shield your applications from potential risks.

 

Select recordings from the above dropdown menu to listen to any webinars you may have missed and to learn about helpful security tips, information and tools for your next project.

 

 

S2001 - Embedded Security Primer

 

Video

Subject : Webinar 1

As an introduction to embedded security, this session will cover the basic concepts, threats and design guidelines for making your embedded solutions future proof for security threats. The topic will cover Why, How & What of embedded security. Attendees will be introduced to Microchip Security Solutions which cater to emerging security needs.

 

S2002 - Pre-provisioned Secure Elements:

On-boarding with Trust&GO for AWS IoT

Video

Subject : Webinar 2

Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We will show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.

 

S2003 - Secure Authentication with TrustFLEX Secure Element and Microsoft Azure

Video

Subject : Webinar 3

The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.

 

S2004 - Trust Your Firmware: Secure Boot for Application Processors

Video

Subject : Webinar 4

A particularly insidious form of malware is a rootkit. It loads before the operating system boots and can hide from ordinary anti-malware software. Therefore, they are notoriously difficult to detect and remove. An ideal way to defend against rootkits is ‘secure boot.’ Join Microchip to learn how to protect a system against threats before any malware can be loaded into the system.

 

S2005 - Secure MPU Boot for the Insecure World

Video

Subject : Webinar 5

A hardware root of trust is the foundation for protecting your products. Having a secure boot is at the heart of a sustained root of trust through the entire product life cycle. Starting with a secure production, deployment and secure field updates. Learn how easy a secure boot can be on a Microchip MPU.

 

S2006 - Automotive Network Security

Video

Subject : Webinar 6

As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our webinar, we’ll share tips and techniques for improving security fundamentals in the cars of tomorrow.

 

S2007 - PolarFire SoC Secure Boot Methodologies

Video

Subject : Webinar 7

PolarFire SoC FPGAs provide secure boot out of the box. Join us to learn how you can roll out your own secure boot methodology using these devices’ secure, non-volatile memory that is protected with physically unclonable function technology

 

S2008 - Protecting Your IP in a Cloud-connected World

Video

Subject : Webinar 8

The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.

 

S2009 - Symmetric Cryptography Primer

Video

Subject : Webinar 9

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using cryptography in your connected design.

 

S2010 - Wi-Fi® Security for Enterprise

Video

Subject : Webinar 10

Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating in strict security environments.

 

S2011 - GoodLock Project Using SAM L11 and TrustFLEX ATECC608 Secure Element

Video

Subject : Webinar 11

Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.

 

S2012 - Secure Authentication with TrustFLEX Secure Element and Your Own Certificate Authority for AWS IoT

Video

Subject : Webinar 12

Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.

 

S2013 - Platform Firmware Resiliency

Video

Subject : Webinar 13

Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join our webinar as we discuss the NIST 800-193 guidelines for Platform Firmware Resiliency.

 

S2014 - Counterfeit Protection for Disposable Applications

Video

Subject : Webinar 14

Learn how our secure elements and symmetric authentication can be used to help reduce the counterfeiting of disposable cartridges and consumable goods. We will introduce you to the ATSHA206A secure element’s architecture and features and discuss how this solution can be used to enable secure authentication between a host and a disposable cartridge.

 

S2015 - Firmware Verification with TrustFLEX Secure Elements

Video

Subject : Webinar 15

Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.

 

S2016 - Demystifying the ISA/IEC 62443 Security Standard for Industrial Systems

Video

Subject : Webinar 16

As industry 4.0 and smart factories continue to connect their assets and equipment to the cloud, attack surfaces grow exponentially. The ISA/IEC 62443 specification has been developed to help companies that provide equipment and infrastructure to the industrial segment to architect their systems with security in mind. Join us as we discuss how our ATECC608 secure element and Security Pattern can facilitate your journey to a successful IEC 62443 certification.

 

S2017 - Pre-provisioned Wi-Fi® MCU Speeds Time to Market and Streamlines Production

Video

Subject : Webinar 17

For IoT products, security is always top of mind. But for engineers, how to produce, provision and protect the secrets that enable secure IoT products is also a key concern. This webinar will introduce you to the WFI32E01PC family of Wi-Fi-enabled MCUs featuring Trust&GO platform technology. Discover how this solution provides a factory-programmed, verifiable and secure identity in one integrated module to drastically reduce the complexity and effort required to produce IoT products.

 

S2018 - Platform Firmware Resiliency in Automotive Applications

Video

Subject : Webinar 18 - Platform Firmware Resiliency in Automotive Applications

Automobiles are now referred to as data centers on wheels. Outfitted with advanced sensors and computers, fully autonomous cars are projected to produce 4,000 GB of data per day! How do you protect your vehicle from risk during the boot process and during firmware updates? Join us as we discuss platform firmware resiliency in automotive applications.

 

S2019 - Develop Secure IoT Edge-to-Cloud Applications in Linux® with PKCS #11 and Secure Elements

Video

Subject : Webinar 19 - Develop Secure IoT Edge-to-Cloud Applications in Linux

During this webinar, you will learn how to enable code reusability, simplify integration and reduce maintenance costs for secure authentication in connected embedded Linux applications. Our security experts will discuss how our solutions support the standard PKCS #11 interface via the CryptoAuthLib library and security-hardened devices like the Trust Platform’s ATECC608 and the Trust Anchor TA100.

 

S2020 - Simplifying Secure Application Designs with dsPIC33/PIC24 and ATECC608/TA100 Devices

Video

Subject : Webinar 20 - Simplifying Secure Application Designs with dsPIC33/PIC24 and ATECC608/TA100 Devices

Learn how the dsPIC33 Digital Signal Controllers (DCSs) and PIC24 microcontrollers with their hardware code protection features and Microchip's secure elements (ATECC608 and TA100) enable implementing robust security in your Industrial, Consumer, Medical IoT designs and Secure Automotive Applications. You will also learn how MPLAB® Code Configurator (MCC), a free graphical programming environment simplifies implementing immutable secure boot, secure firmware updates and other secure use cases in your application using these devices.

 

S2021 - Data Center Security Solutions

Video

Subject : Webinar 21 - Data Center Security Solutions

With the explosion of data being created and consumed in the world today, the data center has become the target of individual, corporate, and even government-sponsored attacks to compromise, steal, and exploit personal, financial, medical and military and other data and secrets. The compromised company’s brand, revenue, IP and customers are at stake. Depending on the severity and financial impact of a security breach, the company itself may be at stake. Join us for this SHIELDS UP! webinar to learn how our security solutions can provide trusted platform support to help you mitigate and eliminate the risks associated with security vulnerabilities.

 

S2022 - Wireless Charging Authentication Compliance With the Wireless Power Consortium (WPC)

Video

Subject : Webinar 22 - Wireless Charging Authentication Compliance With the Wireless Power Consortium (WPC)

The WPC is now mandating new secure authentication requirements per the WPC 1.3 specification. During this session, our expert will explain what the specification requires in terms of security and will navigate you through the WPC authentication process. He will also discuss what is required from your secure element vendor to successfully pass your WPC certification when implementing secure authentication.

 

S2023 - Avnet Cloud With ATECC608 TrustFLEX Secure Authentication

Video

Subject : Webinar 23 - Avnet Cloud With ATECC608 TrustFLEX Secure Authentication

Avnet, one of our distributor partners, created a development kit based on our Trust Platform that supports the Trust&GO, TrustFLEX and TrustCUSTOM secure elements. Microchip and Avnet will co-present and explain how you can get started with the Avnet IoTConnect cloud platform by leveraging our SAME54 32-bit microcontroller (MCU) with Mbed TLS and our secure element combined with the EBVchips Heracles 324G LTE-M/NB-IoT modem.

 

S2024 - Automotive Security: CAN FD Secure Boot and Message Authentication With TA100-VAO for ADAS and IVI Systems

Video

Subject : Webinar 24 - Automotive Security: CAN FD Secure Boot and Message Authentication With TA100-VAO for ADAS and IVI Systems

Our automotive security expert will dive into the needs and requirements of secure boot and message authentication functions for CAN FD buses in Advanced Driver-Assistance Systems (ADAS) and In-Vehicle Infotainment (IVI). He will also explain how the Trust Anchor TA100-VAO brings scale and security into your secure boot and message authentication for vehicle Engine Control Units (ECUs).

 

S2025 - Edge Computing: Secure IoT With PolarFire® SoC FPGAs

Video

Subject : Webinar 25 - Edge Computing: Secure IoT With PolarFire® SoC FPGAs

The Internet of Things (IoT) is expanding with increasing intelligence at the edge. These connected systems are as secure as their weakest node. In this session, you'll learn how our award-winning PolarFire® Field Programmable Gate Arrays (FPGAs) and PolarFire SoC FPGAs enable end-to-end security in the connected world.

 

S2026 - ADAS Platform Root of Trust

Video

Subject : Webinar 26 - ADAS Platform Root of Trust

Computers and other firmware-driven products have become integrated with nearly every aspect of modern life. Even the cars we drive have turned into data centers on wheels. Autonomous driving is an exciting technology that is quickly spreading across the automotive market. Naturally, you may wonder how data security and physical safety are ensured against external threats to these applications. In this webinar, our expert will discuss how we provide protection for ADAS systems and secure the code against remote attacks.

 

S2027 - Manufacturing Logistic Challenges of Secure Key Provisioning: Advantages of a Discrete Secure Element

Video

Subject : Webinar 27 - Manufacturing Logistic Challenges of Secure Key Provisioning: Advantages of a Discrete Secure Element

Would you like to learn how choosing a secure element can reduce your project risk and save you money? Join us for this webinar to learn how provisioning cryptographic keys can significantly decrease costs and risks during your product’s development and production. We will also outline the benefits of using our secure elements, like the ATECC608, and leveraging our Trust Platform tools and in-house provisioning service as your security foundation to reduce your costs and risks.