Security webinars

Welcome to our security webinars

Take this opportunity to find out how you can protect your IoT business model with hardware-based security solutions from Infineon.

Choose from our series of free webinars!

Upcoming webinars

Date Webinar topic Registration
July 18th 2018 How easy is it to connect devices securely to the IoT? Register now!

 

How easy is it to connect devices securely to the IoT?

Free on demand!

Watch now!

Overview

Providing a Public Key Infrastructure (PKI) is challenging for any design process.  With the IoT, additional constraints, like the number of devices to be connected and the computing power required, significantly increase the complexity of this task. We will review these constraints and show how the OPTIGATM Trust X solution can help you to reduce complexity when adding security to your PKI design.
Aimed at Everyone interested in the innovative security technologies.

 View now!

Post-quantum cryptography

Free on demand!

Watch now!

Overview

Have you ever wondered how quantum computers will impact traditional cryptography? Or how to prepare yourself for the quantum computer age?

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Quantum computer attacks on today's cryptography are expected to become reality within the next 15 to 20 years. Once available, quantum computers could solve certain calculations much faster than today's computers, threatening even best currently known security algorithms such as RSA and ECC. The solution is post-quantum cryptography (PQC) for security technologies.

Join our free webinar to get a brief introduction into post-quantum cryptography (PQC), as well as an update on the current status of research including real-world demonstrations on smart cards. We look forward to sharing our knowledge with you and helping you to prepare for the security challenges of the future.

Takeaways     

Join our free webinar and learn:

  • Which challenges arise from quantum computers?

  • What is PQC and what are the concepts behind it?W

  • What are the latest developments in PQC, both in academia and industry?

  • What is the real-world implementation of PQC on a contactless security chip about?
Aimed at Everyone interested in the innovative security technologies.

 View now!

Strong security for smart factories

Free on demand!

View now

Overview

Smart factories rely on networked industrial environments, which promise huge efficiency gains and customized production capabilities. However, automated communication between cyber-physical systems also poses significant threats and risks to suppliers as well as customers.

This webinar starts off by giving you an overview of the security challenges facing smart factories, going on to introduce protection concepts for industrial devices such as routers, PLCs and industrial PCs. It winds up with real-world solutions that show you how to secure authentication and protect the integrity of your industrial devices.

Takeaways     

Watch this webinar to learn:

  • About common security threats facing smart factories
  • How hardware-based security enables strong protection of industrial automation systems
  • About implementation concepts for secured authentication and protection of device integrity

Aimed at

Design engineers, system architects and product managers involved in device and system design for industrial automation systems.

View now!

Security solutions for today’s connected car

Free on demand!

View now

Overview

Connected cars will be at the heart of tomorrow’s mobility landscape. They will have full Internet access, also supporting mesh communications with other vehicles and road/traffic infrastructure. However, this increased level of communication also opens up the risk of cyber-attacks.

This webinar presents proven solutions that enable you to build an automotive communications architecture that can benefit from the growing opportunities of connectivity without compromising on security.

Takeaways    

Watch this webinar to learn:

  • How to benefit from car connectivity without exposing security risks
  • About security measures required to protect the system architecture of a connected car
  • How software updates over the air (SOTA) can be secured with TPM (Trusted Platform Module)

Aimed at

Design engineers, system architects, product managers and involved in car connectivity

View now!

Integrating the right security in smart homes

Free on demand!

View now

Overview

Smart homes are one of the fastest-growing segments in the IoT. Intelligent applications such as connected thermostats, washing machines and lights make life easier and more convenient for home dwellers, also helping to cut electricity bills. However, these networked devices can also open virtual doors to unwanted guests. The challenge facing smart home service providers and device manufacturers lies in protecting their services and products against digital threats.

In this webinar we will explain how a smart home basically works, how attacks affect a smart home and how providers can protect their products, business models and services for the benefit of the consumer.

Takeaways     

Watch this webinar to learn:

  • More about typical smart home systems, applications and devices
  • About common threats facing smart homes and the resulting need for security
  • What security measures should be implemented in the system architecture of a smart home

Aimed at

Design engineers, system and security architects and product managers involved in device and system design for smart homes.

View now!

Securing the networks and servers in the IoT’s nervous system

Free on demand!

View now

Overview

Easily overlooked, the all-important central nervous system behind the IoT is made up of computers, servers and networks. The conventional approach to IoT security focuses on devices – such as sensors and motors – that are connected to networks. Yet most recent IoT attacks exploit security gaps in the actual servers, networks or the cloud.

In this webinar, we will explain why and how attackers target IoT networks and servers. We will also look at how you can use proven technologies to make your IoT networks and servers more resistant to attacks.

Takeaways      

Watch this webinar to learn:

  • More about typical security threats facing ICT networks and servers
  • About recommended countermeasures such as secured firmware updates
  • More about real attacks that actually took place and successful defense strategies

Aimed at

Design engineers and managers, system architects and engineers involved in product or system development for IoT networks, servers or cloud computing systems.

View now!

Title About the webinar More information
Meeting rising transport ticketing challenges: Why open standards are a prerequisite for future-proof system upgrades

This webinar comes at a time when the transport ticketing market is about to experience the undisputable advantages of open standards and how to leverage the interoperability, competitive and open membership benefits of open standards to meet current and future challenges, like higher security and successful multi-application implementations.

watch now
CIPURSE™ Open Security Standard for Access Control and Multi-application Worldwide, electronic access control restricts entrance to millions of properties, buildings, and systems. Not surprisingly, the access control market is very fragmented, with hundreds of different providers and a wide range of technologies available - from pin-pads and tokens to biometrics. Adding all those different solutions and technologies to multi-application devices is not possible, especially with the challenge of providing future proof security. click here