Skip Navigation

Recorded Webinar: Embedded System Security Across the Supply Chain

Complete the form below to watch a recording of webinar

Thank you for your interest! Your webcast is being downloaded now.

If the link does not open immediately, please click here to access the webcast.

Are you sure you don't want to stay in touch?

If you'd like to receive communications from us, please select the box above. You can always update your preferences later from our Privacy Policy. If the box is left blank, your information will NOT be collected by BlackBerry.

Download Now

Error submitting form. Please try again later.

We are living in a world where devices are becoming more connected. And this opens the door to innovation and new business opportunities.  But it also leaves device manufacturers and OEMs struggling to balance evolving market demands with staying ahead of the growing threat of cyberattacks and the potential for product recalls. For designers, baking security into embedded products takes a great deal of knowledge and experience. For integrators, ensuring the level of security within each underlying component presents its own set of challenges. So, to ensure the security of your products, you need a holistic approach that lets you continuously assess every attack surface, from the lowest level in the end-point, all the way into the cloud. This one-hour webinar will explore two key areas of the holistic security chain:  embedded security on end-points and security challenges for system integrators.

You will learn about:

  • Techniques and solutions to design and develop threat-resilient end-points
  • The many flavors of access control
  • Best practices to address integration issues, including building a software “nutrition label”
  • How to establish a software inventory to continually assess threats

Speakers

Yi Zheng, Product Manager, BlackBerry QNX

Yi Zheng is the product manager responsible for BlackBerry QNX’s portfolio of safety and security products designed for the industrial, automotive, energy, and railway markets, and that are certified to standards such as IEC 61508, ISO 26262, and Common Criteria ISO/IEC 15408.Prior to joining BlackBerry QNX, Yi worked at Entrust Technologies, Autodesk, and Nortel Networks, designing a wide range of software applications. She holds a Bachelor's in Computer Science from Carleton University and a Master's in Business Administration from Queen’s University, and is a Certified Management Accountant.

Adam Boulton, CTO, BlackBerry

Adam Boulton is a highly experienced technology security professional and Executive, with over 12 years’ experience within security engineering. Adam is employed as the Chief Technology Officer, BlackBerry Technology Solutions. Adam graduated from Sheffield Hallam University in 2005 with a 1st Class BSc (Hons) in Software Engineering. Since graduating Adam has worked in security industry in a variety of technical roles from reverse engineering, to wide ranging security assessments and secure software development. He has been an individual contributor on a wide range of technologies, securing both security and safety critical systems. As Senior Vice President of Product Security for 10 years, Adam gained a deep working knowledge of security engineering and international product management. Adam worked directly on securing the BlackBerry Android operating system. He represents BlackBerry is several mergers and acquisitions and went on to creating BlackBerry Cybersecurity Professional Services. Today, Adam is the Chief Architect for BlackBerry Jarvis, a revolutionary static binary analysis solution for safety and security critical systems. His accolades include ISC2 Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certified Secure Software Lifecycle Professional (CSSLP), Qualified Security Team Member (QSTM), CyberScheme Team Member (CSTM) and Oracle Certified Java Associate (OCJA).