Okay

Get in Touch

General
(508) 921-4600
Sales@ueidaq.com
Support@ueidaq.com

UEI Europe Office
Salesemea@ueidaq.com

Click here for local offices and distributors.

Find us on WeChat.

Webinar | Thurs. Nov. 9, 2023@10EST | Aerospace Cybersecurity Solutions: Lock It Down Before You Send It Up!

REGISTER HERE

Presenters:

  • Erik Goethert, Sr. Director of BD & Strategic Marketing, United Electronic Industries
  • Colin Duggan, Founder/CEO, BG Networks, Inc.

Overview

With the increasing adoption of more complex electronic systems, larger code bases, and network connectivity, the threat surface for Aerospace applications is growing significantly. Cybersecurity has become paramount to managing operational and safety risks of avionics systems overall and even for devices at the edge such as data acquisition and control hardware. DO-326a calls for the assessment or risk in avionics systems. When the operational and safety aspects of cyber-physical hardware at the edge are considered in a risk assessment, naturally a Zero-Trust set of controls emerge. Zero-Trust at the edge is good approach to managing cyber-risk and to help ensure the safety and efficiency of flight operations.

An overlooked aspect of securing systems is key management which is particularly difficult when it comes to embedded systems. All the right risk-based decisions could be made with respect to securing attack paths, but if secure key management is not considered, those controls will be easily compromised.

In this webinar, you will gain valuable insights into safeguarding critical data acquisition and control systems, ensuring the continued safety and reliability of aerospace operations while keeping ahead of evolving cyber risks.

Attendees will learn:

  • Why a risk-based approach to cybersecurity, such as that called for by DO-326a, makes sense
  • How to reduce cyber-risk in avionics data acquisition and control hardware
  • Naturally, how a Zero-Trust implementation emerges for these systems when they are managing critical data and control critical flight systems
  • Resulting security controls in hardware and in a full stack software implementation from a hardware root of trust to access control
  • The challenges of key management for avionics systems at the edge and how to address them.