Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

SHIELDS UP! South Asia Webinar Archive

Select recordings from the playlist below to listen to any webinars in this series that you may have missed and to learn about helpful security tips, information and tools for your next project.

Shields Up!


Webinar #1: Embedded Security Primer

As an introduction to embedded security, this session will cover the basic concepts, threats and design guidelines for making your embedded solutions future proof for security threats. The topic will cover Why, How & What of embedded security. Attendees will be introduced to Microchip Security Solutions which cater to emerging security needs.



Webinar #2: Trust&GO for Any Cloud

Quickly and easily implement secure authentication for your Internet of Things design using our Trust&GO platform. We will show you how to streamline the process of enabling network authentication using our ATECC608A secure elements.



Webinar #3: Secure Authentication with TrustFLEX Secure Element and Microsoft Azure

The TrustFLEX secure element is a pre-configured device that can leverage Microchip’s secure provisioning service. It reduces cost and risk, preventing the exposure of your secret keys to software or third parties. During this session, we will review the various authentication use cases TrustFLEX offers by default and explain how you can implement device-to-cloud secure authentication using Microsoft Azure IoT Hub.



Webinar #4: Trust Your Firmware: Secure Boot for Application Processors

Secure boot protects against rootkit and bootkit attacks to the pre-boot firmware environment. This webinar discusses how to protect a system that boots from an external SPI Flash to extend a Root of Trust.



Webinar #5: Secure Boot for Microprocessors

From production to deployment to field updates, secure boot protects your microprocessor (MPU) solution from the very start. A secure boot is at the heart of a sustained hardware root of trust, ensuring the integrity of your device through its entire lifecycle. Join us for this webinar to learn how easy it can be to enable secure boot on your Microchip MPU.



Webinar #6: Automotive Network Security

As in-vehicle networks continue to evolve in scale and complexity, more nodes are connected to the Controller Area Network Flexible Data-Rate (CAN FD) network, expanding the potential attack surface for hackers. In our live webinar, we’ll share tips and techniques for improving security fundamentals in the cars of tomorrow.



Webinar #7: PolarFire® SoC FPGA Secure Boot

PolarFire SoC FPGAs provide secure boot out of the box. Join us live to learn how you can roll out your own secure boot methodology using these devices’ secure, nonvolatile memory that is protected with physically unclonable function technology.



Webinar #8: Protecting Your IP in a Cloud-Connected World

The rapid explosion of cloud-enabled applications and businesses is generating a larger connectivity footprint. This means your IP is now facing a bigger and more global threat from hackers, counterfeiters and competitors. We will discuss threats and how to counter them using a hybrid solution comprised of both hardware and software.



Webinar #9: Symmetric Cryptography Primer

Are you unfamiliar with cryptography or do you need a refresher in secure communication? At this webinar, we will explore the fundamentals of symmetric cryptography and discuss how identity is created and used for authentication, integrity and confidentiality. We will also provide real-world application examples to help you get started with using cryptography in your connected design.



Webinar #10: Wi-Fi® Security for Enterprise

Many of us are familiar with logging into home Wi-Fi networks using WPA2. Larger organizations, however, such as campuses and corporations, require more advanced security protocols. This webinar will highlight the different requirements for operating in strict security environments.



Webinar #11: GoodLock Project Using SAM L11 and TrustFLEX ATECC608 Secure Element

Join us as Future Electronics introduces the GoodLock, a unique and trusted board that can help any designer develop and test hardware security solutions for their embedded designs. This robust and cost-effective device’s advanced features include an on-board debugger/programmer, making it the perfect platform to add trust to your product.



Webinar #12: Secure Authentication with TrustFLEX Secure Element and Your Own Certificate Authority for AWS IoT

Discover the advantages of using the pre-configured ATECC608A TrustFLEX secure element along with the AWS IoT Core to implement secure authentication. We will discuss mutual authentication, OTA verification, secure boot assistance, key rotation, firmware IP protection and more. See how easy it is to go from prototype to provisioning to production with this security solution.



Webinar #13: Platform Firmware Resiliency

Does your system boot from an SPI Flash? How do you protect your system from risk during the boot process and during firmware updates? How does your system detect and recover from corrupted Flash files? Join Microchip as we discuss the NIST 800-193 guidelines for Platform Firmware Resiliency.



Webinar #14: Counterfeit Protection for Disposable Applications

Learn how our secure elements and symmetric authentication can be used to help reduce the counterfeiting of disposable cartridges and consumable goods. We will introduce you to the ATSHA206A secure element’s architecture and features and discuss how this solution can be used to enable secure authentication between a host and a disposable cartridge.



Webinar #15: Firmware Verification with TrustFLEX Secure Elements

Learn how the pre-configured ATECC608A TrustFLEX secure element can assist with secure boot for small microcontrollers, protect a public key during an Over the Air (OTA) update and help improve firmware intellectual property protection. This webinar will include transaction diagrams and a brief tutorial on how you can use the Trust Platform Design Suite software tool to implement your application.