Embedded Insecurity: What Lies Beneath

  • Wednesday, February 29, 2012 | 8:00 AM – 9:10 AM | Room: Room 132

View all Sessions

From cell phones to voting machines to pace makers to printers: embedded devices are everywhere. Many are network enabled but in some cases security has been ignored. Over the past year we’ve seen embedded device hacks that have shaken the industry. Join this panel of experts to look at the state of embedded security, and what it means to you and your company.


This document was retrieved from on Tue, 16 Jul 2019 12:37:14 -0400.