Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

SHIELDS UP! Webinar Archive

Select recordings from the playlist below to listen to any webinars in this series that you may have missed and to learn about helpful security tips, information and tools for your next project.

Shields Up!


Webinar #1: Implementing Multizone Security in RISC-V Applications

Join Cesare Garlati, a long-time supporter of the RISC-V Foundation and active member of the RISC-V Security Group, as he shares the latest on RISC-V security and offers advice for developing secure applications, especially in Internet of Things (IoT) devices that lack a Memory Management Unit (MMU).



Webinar #2: Microchip Trust Platform for the CryptoAuthentication™ Family

Learn about our Trust Platform, a three-tier provisioning service for our secure elements that also includes anew suite of tools, pre-packaged code examples and a simple supply chain process to protect keys.



Webinar #3: Protecting Your IP in a Cloud-Connected World

The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.



Webinar #4: Trust Your Firmware: Secure Boot for Application Processors

Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.



Webinar #5: RISC-V Enclaves

MultiZone™ Security is the first Linux® enclave for RISC-V. Our MultiZone demo will demonstrate how to secure the deterministic behavior of mixed-criticality systems where Linux and real-time come together in a single PolarFire® device.



Webinar #6: The Importance of Quantum Resistance for Critical Security Functions

In the world of quantum computers, signature verification methods must be resistant to quantum computer attacks. Veridify’s security methods can be implemented solely in software, allowing developers to easily implement critical security functions such as secure boot and secure firmware updates on platforms such as the PolarFire SoC FPGA. This webinar will also describe the power and scalability of DOME, a device on-boarding, management and enrollment platform for securing a PolarFire SoC FPGA throughout its life cycle.



Webinar #7: Trust&GO for Any Cloud

Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We’ll show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.



Webinar #8: Secure Your Embedded Software’s Intellectual Property Using IAR Systems’ C-Trust

The importance of protecting your valuable intellectual property cannot be overstated. Join us for a live webinar where we'll discuss how to implement efficient IP protection using state-of-the-art cryptography techniques. We will also cover the latest legislation with regards to the IoT, recommended design guidelines for connected devices and how microcontroller (MCU) hardware is used to implement a root of trust. We will close with a walkthrough of the C-Trust tool, highlighting the simplicity of adding IP protection to your connected application.



Webinar #9: Secure Boot for Microprocessors

From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.



Webinar #10: Automotive Network Security

As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share tips and techniques for improving security fundamentals in the cars of tomorrow.



Webinar #11: Platform Firmware Resiliency

Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines for Platform Firmware Resiliency.



Webinar #12: PolarFire® SoC FPGA Secure Boot

PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology



Webinar #13: Secure Authentication with TrustFLEX Secure Element and Microsoft Azure

The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.



Webinar #14: Wi-Fi® Security for Enterprise

Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating in strict security environments.



Webinar #15: Quantum Public Key Infrastructure

Quantum computing can pose a threat to today’s Public Key Infrastructure (PKI). What’s the solution? Why, quantum-resistant cryptography, of course. Join us with our guest, Reza Azarderakhsh, CEO of PQSecure Technology, to discuss his company’s National Standards and Technology candidate for quantum PKI. Reza will additionally outline PQSecure’s quantum-resistant PKI solution running on Microchip PolarFire® FPGAs.



Webinar #16: Secure Authentication with TrustFLEX Secure Element and Your Own Certificate Authority for AWS IoT

Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.



Webinar #17: Symmetric Cryptography Primer

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using cryptography in your connected design.



Webinar #18: GoodLock Project Using SAM L11 and TrustFLEX ATECC608 Secure Element

Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.



Webinar #19: Firmware Verification with TrustFLEX Secure Elements

Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.



Webinar #20: Accessories Authentication with Secure Elements

If you need to protect your revenue, brand or intellectual property, join us to learn how our Trust Platform for CryptoAuthentication™ Family of secure elements can help with the authentication of accessories and peripherals. We will be using a pre-configured ATECC608A TrustFLEX secure element to walk you through a short tutorial on how use the Trust Platform Design Suite software tool to easily implement secure authentication.



Webinar #21: Asymmetric Cryptography Primer

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of asymmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using asymmetric cryptography in your connected design.



Webinar #22: Enabling Device Security with a Formally Verified Microkernel

Verifying that a system is secure can be a difficult proposition. It requires performing numerous tests that provide increased confidence in, but never quite prove, the security of an application. Formal verification is an effective alternative to testing, since it can be used to definitively prove the security properties of individual software applications. Join speakers from DornerWorks and Microchip as they discuss how formal verification can make your products more secure. They will demonstrate how the seL4 microkernel running on a PolarFire® SoC FPGA provides an excellent starting point for your next security-focused product.



Webinar #23 Counterfeit Protection for Disposable Applications

Learn how our secure elements and symmetric authentication can be used to help reduce the counterfeiting of disposable cartridges and consumable goods. We will introduce you to the ATSHA206A secure element’s architecture and features and discuss how this solution can be used to enable secure authentication between a host and a disposable cartridge.



Webinar #24 Using WolfSSL and Pre-Configured TrustFLEX ATECC608 Secure Element for TLS Networks

Learn how to implement mutual authentication using X509 certificates with the WolfSSL TLS stack and the TrustFLEX ATECC608 secure element from Microchip’s Trust Platform. We will discuss TLS concepts in the first half of the webinar, and then an expert from WolfSSL will give a hands-on demonstration featuring a SAM D21 Arm® Cortex®-M0+ based microcontroller and a WINC1500 Wi-Fi® module to show how easy it is to get started with mutual authentication.



Webinar #25 The Three Vital Threes

This webinar will cover the most common security needs for certified systems. We will discuss suggested hardware, suggested cryptographic functions and attributes all connections should have. While this webinar is still considered a beginner class in cryptography, some prior knowledge of the fundamentals of cryptography is required.



Webinar #26 Simplifying Secure Application Designs with dsPIC33/PIC24 and ATECC608 Devices

Learn how dsPIC33 Digital Signal Controllers (DSCs) and PIC24 microcontrollers (MCUs) offer hardware code protection features that complement the ATECC608 secure element to implement secure boot and Over-the-Air (OTA) firmware updates in your application. We’ll also discuss how MPLAB® Code Configurator (MCC) simplifies the implementation of security for your application.



Webinar #27 Platform Firmware Resiliency in Automotive Applications

Automobiles are now referred to as data centers on wheels. Outfitted with advanced sensors and computers, fully autonomous cars are projected to produce 4,000 GB of data per day! How do you protect your vehicle from risk during the boot process and during firmware updates? Join us as we discuss platform firmware resiliency in automotive applications.



Webinar #28: Pre-Provisioned Wi-Fi® MCU Speeds Time to Market and Streamlines Production

For IoT products, security is always top of mind. But for engineers, how to produce, provision and protect the secrets that enable secure IoT products is also a key concern. This webinar will introduce you to the WFI32E01PC family of Wi-Fi-enabled MCUs featuring Trust&GO platform technology. Discover how this solution provides a factory-programmed, verifiable and secure identity in one integrated module to drastically reduce the complexity and effort required to produce IoT products.



Webinar #29: Securing the IoT from the Endpoint to the Cloud

If you are developing IoT systems, this webinar will help you learn how to use TLS/MQTT to ensure secure endpoint-to-cloud communication and employ hardware roots of trust to enable strong security. We will also explain how to use wolfSSL, with its secure software suite integrated within our MPLAB® Harmony Framework, to secure endpoint communication.