YoVDO

Security Technology Adoption: Challenges Beyond Hardware Development

Offered By: USENIX Enigma Conference via YouTube

Tags

Hardware Security Courses Harm Reduction Courses Connected Devices Courses

Course Description

Overview

Explore the challenges of security technology adoption in connected devices and systems in this 14-minute conference talk from USENIX Enigma 2018. Delve into the complexities of implementing hardware security features, including roots of trust and processor innovations, as Paul Waller, Technical Director for Platform Security Research at NCSC, examines the low market support for these advancements. Discover potential solutions to bridge the gap between available security technologies and their practical implementation, covering topics such as the device iceberg, marketing strategies, harm reduction, new incentives, tools and techniques, firmware updates, and guidance for improving security practices in the UK.

Syllabus

Introduction
Device Iceberg
Hardware
Marketing
Reducing Harm
New Incentives
Tools and Techniques
Firmware Updates
Guidance
Fixing the UK
Conclusion


Taught by

USENIX Enigma Conference

Related Courses

Alcohol, Drugs, and Baby Boomers: Are you ready?
Johns Hopkins University via Coursera
Drug Use and Harm Reduction
London School of Hygiene & Tropical Medicine via FutureLearn
Usage de drogues et réduction des risques
London School of Hygiene & Tropical Medicine via FutureLearn
Drugs, drug use, drug policy and health
University of Geneva via Coursera
Identifying and Responding to Drug and Alcohol Addiction in Nursing, Midwifery and Allied Healthcare Practice
Trinity College Dublin via FutureLearn