Learn how to addressing medical and industrial challenges with BlackBerry QNX...Qt
The QNX® Neutrino® and its safety variant, the QNX® OS for Safety, are widely regarded as safe and secure operating systems for embedded devices, and Qt is one of the most widely used application and device development frameworks. In this webinar we will explore how solutions from these two embedded powerhouses can be combined for an even more powerful solution when stringent functional safety and security requirements are encountered.
Towards 0-bug software in the automotive industryAshley Zupkus
What are the software safety and security standards that software developers in the automotive industry need to meet? How can safe, secure code be developed in accordance with the industry norms like ISO 26262, ISO 21434, and SOTIF? Experts specialized in the automotive industry will answer all your questions in this webinar dedicated to automotive software safety and security.
1. Latest safety and security standards for automotive software (ISO 26262, ISO 21434, and SOTIF) and how they impact software developers' work - Amin Amini, CertX
2. How to implement coding best practices to ensure the highest levels of safety & security in software in autonomous vehicles - Arnaud Telinge, EasyMile
3. How can code analysis tools be leveraged to help reach ISO 26262 and ISO 21434 demands more efficiently - Fabrice Derepas, TrustInSoft
Java in the Air: A Case Study for Java-based Environment Monitoring StationsEurotech
Eurotech and Oracle Joint presentation at JavaOne 2014 that introduces:
IoT Present and Challenges
Java, OSGi and Eclipse Kura: IoT Gateway Services
Embedded Data Stream: Edge Analytics
Use Case: Environment Monitoring Stations
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar held on April 30th 2020, covering how to simplify your network management using Westermo software tools WeConnect and WeConfig.
Watch the webinar session here: https://www.westermo.com/news-and-events/webinars/simplify-your-network-management-using-software-tools
Learn how to addressing medical and industrial challenges with BlackBerry QNX...Qt
The QNX® Neutrino® and its safety variant, the QNX® OS for Safety, are widely regarded as safe and secure operating systems for embedded devices, and Qt is one of the most widely used application and device development frameworks. In this webinar we will explore how solutions from these two embedded powerhouses can be combined for an even more powerful solution when stringent functional safety and security requirements are encountered.
Towards 0-bug software in the automotive industryAshley Zupkus
What are the software safety and security standards that software developers in the automotive industry need to meet? How can safe, secure code be developed in accordance with the industry norms like ISO 26262, ISO 21434, and SOTIF? Experts specialized in the automotive industry will answer all your questions in this webinar dedicated to automotive software safety and security.
1. Latest safety and security standards for automotive software (ISO 26262, ISO 21434, and SOTIF) and how they impact software developers' work - Amin Amini, CertX
2. How to implement coding best practices to ensure the highest levels of safety & security in software in autonomous vehicles - Arnaud Telinge, EasyMile
3. How can code analysis tools be leveraged to help reach ISO 26262 and ISO 21434 demands more efficiently - Fabrice Derepas, TrustInSoft
Java in the Air: A Case Study for Java-based Environment Monitoring StationsEurotech
Eurotech and Oracle Joint presentation at JavaOne 2014 that introduces:
IoT Present and Challenges
Java, OSGi and Eclipse Kura: IoT Gateway Services
Embedded Data Stream: Edge Analytics
Use Case: Environment Monitoring Stations
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar held on April 30th 2020, covering how to simplify your network management using Westermo software tools WeConnect and WeConfig.
Watch the webinar session here: https://www.westermo.com/news-and-events/webinars/simplify-your-network-management-using-software-tools
Cybersecurity and Software Updates in Medical Devices.pdfICS
Justin is a Senior Consulting Engineer and Qt Certified Instructor at Integrated Computer Solutions, Inc. (ICS). He has taught Qt and Qt Quick/QML material for both public and on-site courses for many years. He has also written and conducted seminars on Object-Oriented GUI Design techniques. Justin earned his bachelor’s degree in Computer Engineering Technology from Northeastern University.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
IoT Solutions Made Simple with Everyware IoTEurotech
Everyware IoT is the IoT architecture designed by Eurotech: it is flexible, end-to-end and open. Its building blocks are the Multi-service IoT Gateways, Everyware Software Framework (ESF), the Java OSGi software framework for IoT gateways and Everyware Cloud, the IoT integration platform.
IoT and M2M Services for the Railway MarketEurotech
M2M and IoT railway applications in which our customers used Eurotech’s EDC Platform to deliver advanced services and to gain significant savings in achieving better energy efficiency, managing passenger flow and implementing smart video surveillance.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
“Internet of Things” is changing our world and today the Internet of Things knows almost as many applications as there are types of devices connected. In this session, Sam and Glenn will give an overview of the latest IoT solutions, the different learnings from the field and explain which key components are instrumental to integrating your solutions to the Azure IoT platform to ensure they are robust, future-proof and secure.
M2M in Transportation, Mining and AgricultureEurotech
Eurotech's M2M Offering for Transportation and Mobility
Rugged Devices and Solutions for Vehicles
Vertical Market Applications for Transportation, Agriculture and Mining.
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
In this session, Sam will dive deep into the new Azure IoT edge service that allows customers to build intelligent IoT solutions, combining the power of data intensive and low latency edge compute scenarios with the distributed, scalable power of the Azure cloud. Attendees will learn more about the architecture, use cases and programming possibilities of Azure IoT Edge and will understand how this technology can be applied to make modern IoT solutions in different industries. Expect a session with architecture design, scenarios and a lot of demos.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Eurotech
Eurotech Value Proposition in M2M:
- Higher value-add for Customers
- Providing enabling platforms, not just components
So, we help Customers focus on their core competences.
Secure Your Medical Devices From the Ground Up ICS
The Food and Drug Administration (FDA) has recently released new guidance on cybersecurity for medical devices. This presentation will provide an overview of this guidance and review what is required for 510(k) submissions. We will also discuss the upcoming European Union (EU) cybersecurity regulations and how they compare to the FDA guidance.
This webinar with ICS and partner RTI, the largest software framework company for autonomous systems, will focus on threat modeling and cybersecurity risk assessments in light of the new guidance, and how these activities impact design requirements for medical devices. You will learn common pitfalls and mistakes to avoid when establishing organizational best practices in cybersecurity.
We will also discuss the challenges to securing data in motion for connected medical devices and describe how a data-centric software framework based on open standards, addresses the design requirements for highly reliable, scalable and secure systems.
Attendees will gain an understanding of the current regulatory expectations, best practices for cybersecurity risk assessments, and standards-based solutions for secure data connectivity.
Microsoft offers a comprehensive set of platforms, Cloud services and Solutions for building Internet of Things applications. In this session you will learn what’s available today, what’s coming soon and what Microsoft’s vision is for the IoT of tomorrow.
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Praxistage
Digitalisierung gestalten: Innovationen, Chancen und Wege in die Zukunft. Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait Austria GmbH)
Más contenido relacionado
Similar a Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Cybersecurity and Software Updates in Medical Devices.pdfICS
Justin is a Senior Consulting Engineer and Qt Certified Instructor at Integrated Computer Solutions, Inc. (ICS). He has taught Qt and Qt Quick/QML material for both public and on-site courses for many years. He has also written and conducted seminars on Object-Oriented GUI Design techniques. Justin earned his bachelor’s degree in Computer Engineering Technology from Northeastern University.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
IoT Solutions Made Simple with Everyware IoTEurotech
Everyware IoT is the IoT architecture designed by Eurotech: it is flexible, end-to-end and open. Its building blocks are the Multi-service IoT Gateways, Everyware Software Framework (ESF), the Java OSGi software framework for IoT gateways and Everyware Cloud, the IoT integration platform.
IoT and M2M Services for the Railway MarketEurotech
M2M and IoT railway applications in which our customers used Eurotech’s EDC Platform to deliver advanced services and to gain significant savings in achieving better energy efficiency, managing passenger flow and implementing smart video surveillance.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
“Internet of Things” is changing our world and today the Internet of Things knows almost as many applications as there are types of devices connected. In this session, Sam and Glenn will give an overview of the latest IoT solutions, the different learnings from the field and explain which key components are instrumental to integrating your solutions to the Azure IoT platform to ensure they are robust, future-proof and secure.
M2M in Transportation, Mining and AgricultureEurotech
Eurotech's M2M Offering for Transportation and Mobility
Rugged Devices and Solutions for Vehicles
Vertical Market Applications for Transportation, Agriculture and Mining.
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
In this session, Sam will dive deep into the new Azure IoT edge service that allows customers to build intelligent IoT solutions, combining the power of data intensive and low latency edge compute scenarios with the distributed, scalable power of the Azure cloud. Attendees will learn more about the architecture, use cases and programming possibilities of Azure IoT Edge and will understand how this technology can be applied to make modern IoT solutions in different industries. Expect a session with architecture design, scenarios and a lot of demos.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
Unique Value Proposition in M2M: Hardware, Software & Service Building Blocks...Eurotech
Eurotech Value Proposition in M2M:
- Higher value-add for Customers
- Providing enabling platforms, not just components
So, we help Customers focus on their core competences.
Secure Your Medical Devices From the Ground Up ICS
The Food and Drug Administration (FDA) has recently released new guidance on cybersecurity for medical devices. This presentation will provide an overview of this guidance and review what is required for 510(k) submissions. We will also discuss the upcoming European Union (EU) cybersecurity regulations and how they compare to the FDA guidance.
This webinar with ICS and partner RTI, the largest software framework company for autonomous systems, will focus on threat modeling and cybersecurity risk assessments in light of the new guidance, and how these activities impact design requirements for medical devices. You will learn common pitfalls and mistakes to avoid when establishing organizational best practices in cybersecurity.
We will also discuss the challenges to securing data in motion for connected medical devices and describe how a data-centric software framework based on open standards, addresses the design requirements for highly reliable, scalable and secure systems.
Attendees will gain an understanding of the current regulatory expectations, best practices for cybersecurity risk assessments, and standards-based solutions for secure data connectivity.
Microsoft offers a comprehensive set of platforms, Cloud services and Solutions for building Internet of Things applications. In this session you will learn what’s available today, what’s coming soon and what Microsoft’s vision is for the IoT of tomorrow.
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Praxistage
Digitalisierung gestalten: Innovationen, Chancen und Wege in die Zukunft. Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait Austria GmbH)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Praxistage
Unternehmensfinanzierungen im Umbruch - Wie gelingt die Transformation hin zu einer nachhaltigen Wirtschaft. Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Die Kunst der Anpassung: Wie die Digitalisierung mit Telekommunikationsleistungen zukünftigen Herausforderungen begegnen kann. Was braucht die Gesellschaft und die Wirtschaft? Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Praxistage
Keynote: Das Versprechen der Transformation einlösen - Die praktische Umsetzung von Digital- und Personal-Strategien in der Landeshauptstadt Kiel. Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung und Feuerwehr der Landeshauptstadt Kiel)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Praxistage
Arbeitskräfteüberlassung, Personalsuche oder Outsourcing? Wie lösen Sie das Problem des technischen Fachkräftemangels in Ihrem Unternehmen. Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Josef Weissinger (Soroban IT-Beratung GmbH)Praxistage
ZMR, SZR, ZPR, RSV und EIDAS? Warum Ihnen diese Abkürzungen als Unternehmen etwas sagen sollten, um Registerservices über den Österreichischen Portalverbund und mit unserer Portallösung nutzen zu können. Josef Weissinger (Soroban IT-Beratung GmbH)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Praxistage
Breitband Austria 2030 – Der österreichischen Weg in die Gigabit-Gesellschaft. Ein Überblick über die Förderprogramme Access, OpenNet, Connect und GigaApp. Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Hr. David Simon (Juniper Networks, Inc.)Praxistage
AI-betriebenes Netzwerk des nächsten Jahrzehnts - Welche Vorteile werden sich für Unternehmen und Benutzer daraus ergeben? David Simon (Juniper Networks, Inc.)
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...QADay
Lviv Direction QADay 2024 (Professional Development)
КАТЕРИНА АБЗЯТОВА
«Ефективне планування тестування ключові аспекти та практичні поради»
https://linktr.ee/qadayua
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
3. › Easy and fast connectivity
› Open to connect to any network
› Security at its core
› Remote accessibility
› 24/7 availability
› Dynamic and self-adapting
› Scalability
Major characteristics
Kontron | Praxistage 2024
What is essential for IoT solutions?
3
How does
this come
about?
› Utilizing connected devices as base
4. › Malware infections
› Data Theft
› Lack of compatibility with new
security technology
› Regular automatic updates
› Exploitable backdoors
› Loopholes or flaws in operation
systems
› Denial of Service (DoS)
Kontron | Praxistage 2024
IoT security issues and challenges at the edge
4
› Insecure interfaces – authentication is key
› Insufficient data protection – insecure
communication and data storage
› IoT skill gap
› Poor IoT device management – shadow
IoT, unmanaged, unknown, unauthorized
5. By managing your connected devices efficiently and securely
Kontron | Praxistage 2024
How can these challenges be solved?
5
Accessibility
Cyber Security
Maintenance
Connectivity
Health
6. 6
› DIY Syndrome
› Time consuming for
personnel
› Difficult to scale
› Limited visibility of health
and performance factors
› Data overload leads to
inefficiencies and
limitation in IoT solution
functionality
Why manual and poor device management is a risk for IT teams?
Common Traps
Kontron | Praxistage 2024
7. › Confidentiality
› Integrity
› Availability
Three pillars on all levels
There is no way around Security by Design (#1)
7
Kontron | Praxistage 2024
Device
System
Network
Application
Cloud
8. Development Process
› Automatic build process (continuous integration)
ensure short development cycles
› Automated testing
› Automated CVE/CWE scanning
› Threat modelling as integrated method for
development and test
› Product development by SCRUM
› Rapid development with APEX
Deployment Process
› Infrastructure as a code enables fast reaction to
changes and requirements
› Integration / Scenario tests with risk assessment
› Automated rollout of new versions on all staging
systems
› Trust areas
› Approval process according to the dual control
principle
› Tracking and registration of each update
› Complete overview of installed versions on each
server
Kontron | Praxistage 2024
Agile Development and Deployment
Security by Design (#1)
8
9. › Knowledge about supply chains
› Knowledge about security status
› Recommendations for actions
Software Bill of Material (S-BOM)
Supplier management (#2)
9
› Which libraries and modules have been used?
› Provide a bill of material
› Determine version and provide documentation
› Are there security issues known?
› Are there patches available?
› Should we use alternatives?
› Tests against CVE/CWE database (e.g. mitre.org / nist.org)
› Description of the security issues
› Allocation of the version to the component
› Notes on remediation
› Automatic tracking of 3rd party software
› Continuous version tracking and documentation of results
Kontron | Praxistage 2024
OLD
NEW
11. The time to act is now
Advanced cyber security regulations by EU legislation
11
2014
2016
2016
2018
2019 2023
EU Cybersecurity Act
European cybersecurity
certification framework
GDPR
Processing of personal data
of individuals
NIS Directive
Directive on attacks against
information systems
NIS2 Directive
“Security by Design” and
“Security by Default”
EU Cyber
Resilience Act
Cybersecurity requirements
for products with digital
elements
Expected
2023
Kontron | Praxistage 2024
12. › EU Data Act
› A new regulation that
establishes uniform rules for
data access, switching cloud
providers, and
interoperability
requirements in the EU.
› Objective: Create a single
data market in the EU with
reuse of data across all
sectors of the economy.
› Target group: Mandatory for
products and services in the
EU
› Validity:
› Cyber Resilience Act
› A proposal for a legal
framework to define
cybersecurity requirements
for hardware and software
products placed on the
market in the European
Union.
› Objective: To improve the
security of digital products
› Target group: Mandatory for
all companies that
manufacture products with
digital elements
› NIS2
› EU-wide piece of legislation
that provides legal
measures to improve the
overall level of cybersecurity
in the EU by ensuring
preparedness and
cooperation between
Member States and
requiring key actors in key
industries to take security
measures and report
incidents.
› Objective: Increase cyber
security and resilience in the
EU
› Target group: Mandatory for
operators of critical
infrastructures
› IEC 63442
› International series of
standards covering cyber
security for operational
technology in automation
and control systems. The
standards take a risk-based
approach to cyber security
and provide a framework for
the systematic assessment,
mitigation and management
of cyber security risks in
industrial automation and
control systems.
› Objective: Ensure reliability
and safety of critical
industrial processes and
infrastructure
› Target group: Mandatory for
offshore installations and
ships
Overview for Mechanical Engineering Companies
Kontron | Praxistage 2024
Major Security Standards 2024
12
Deep Dive
13. 13
Working Team
Our IT team of the charging stations may be in trouble
Core competence:
› Application development
Reality Check!
Kontron | Praxistage 2024
Is this all doable?
Potential gaps:
› Hardware knowledge
› Embedded software expertise
› Network security
› Multi-layered connectivity
VS
14. › Data-driven analysis and decision-making
› Improved automated operations
› Enhanced security
› Seamless connectivity
› Increased efficiency
Why automated device management offers great benefits in
order to future-proofing your fleet?
14
Kontron | Praxistage 2024
OT
IoT
IT
Benefits of the convergence of IT, OT and Internet of Things
16. Device Management KontronOS Docker Management
Integrated but independently usable
Five Key Services of K-PORT
› Condition monitoring of the IoT
devices
› Manage all devices worldwide in a
cloud-based environment for edge
devices
› Easily onboard IoT devices
› Manage device fleets
› Hardened operating system for X86 or
Arm, based on Yocto Linux
› Two redundant operating system
partitions ensuring maximum uptime
› Secure management interface for
updates and deployment
› Short-term updates in case of "critical"
vulnerabilities.
› Manage Docker Containers
› Encapsulate customer applications
(images) in containers
› CLI communication with Docker
Registry
› Deploy Docker containers
automatically with Docker Compose
to fleets of devices in the field
Kontron | Praxistage 2024
17. Remoting VPN-Service
Integrated but independently usable
Five Key Services of K-PORT
Kontron | Praxistage 2024
› Centralized management of desktop and remote
accesses, e.g. RDP & SSH accesses
› Establishment of secure remote connections
› Command line access
› Activate and deactivate temporary direct access to
the machine and plant network
› Direct connection "tunneling" between networks
› Manage, monitor and log VPN connections
› Connect to a device simultaneously
18. How a hardened OS ensures to run them reliably
Kontron | Praxistage 2024
Focus on building your applications is paramount
18
#1 Security
› Flexible and portable: Linux based can be used flexibly for Intel® x86 & Arm® based
devices
› Tailored to Docker containers: containerized applications are lightweight and ideal
for connected devices, KontronOS creates a secure environment for them
› Reduced to the essentials: a minimal Linux operating system with all the necessary
functions it needs to ensure smooth operation
› Maximum uptime: two redundant partitions (active and passive) ensure maximum
uptime in the event of a failure, interruption or failed update and guarantee a
smooth operation of Docker containers
19. KontronOS
Kontron | Praxistage 2024
Hardened operation system as security at its core
19
› Two redundant partitions for redundancy and automated
rollback to older versions in case of problems in the update
process
› Clear separation between operating system and application
level
› Continuous CVE/CWE investigation
› Support of the integrated security mechanism at boot level via
TPM 2.0 on x86 and via HAB for Arm®
› Web UI for configuring network zones of integrated firewall
and IP address
#1 Security
20. From image to template via CLI and Docker Compose integration
Kontron | Praxistage 2024
Automated Build Process
20
#2 Automation
› Image › Single Container
› Container Set
› Docker
Compose
Operation System
+
› Template
or
› CLI
› Drag & Drop
› Docker
Compose
› CLI
› Drag & Drop
21. Plan your rollout scenarios strategically
Kontron | Praxistage 2024
Automated Update Cycle
21
#2 Automation
› Nearby Location
› Test Lab
› Germany
› Norway
Operation System
+
› Template
› Worldwide
22. Standard IoT Stack to Fully Customized
Kontron | Praxistage 2024
Fleet Management Solution that fits your application
22
Standard IoT Stack
KBox A-250 (x86)
Licenses
i.MX8M Mini (Arm®)
Get started right away
Modified Standard
Modified HW: Arm-based to x86-based
Licenses + project costs
Get started in weeks
Fully Customized
Custom HW
Customized OS
Licenses + project costs
Get started in months
#3 Flexibility
23. From Security to Digital Services
Kontron | Praxistage 2024
The interaction of the Susietec® portfolio
23
24. 24
How do you future-proof your IoT solutions?
› Security at its core
› Automation at its heart
› Flexibility in its mind