Thursday, September 25, 10:00 AM – 11:30 AM (Faraday Seminar Room)

Discover the future of embedded software! In a dynamic session, three experts will take you into the world of secure and smart embedded systems. An ethical hacker will reveal live vulnerabilities in embedded devices and show how attackers operate. We will then delve into the new RED guideline and show you how to meet the requirements with smart software solutions, such as detecting attacks and updating firmware.

Finally, we explore the role of AI in embedded software development: how powerful is it, where are the opportunities, and – equally important – how secure is AI-generated code?
Get inspired by practical examples and concrete tips for robust, future-proof embedded applications. Don't miss this unique look into the world of embedded security and AI!

Register

 

10:00 – 10:25

Safe until proven otherwise

A secure product does not come about by accident. From threat modeling to security reviews, many processes come together when designing a secure product. What happens when these processes are not carried out properly? Under the motto “secure, unless proven otherwise”, Kiwa’s ethical hackers regularly discover vulnerabilities in various products.

In this presentation, Kiwa provides a look behind the scenes: how security flaws are unintentionally overlooked during design, how Kiwa's hackers exploit these vulnerabilities, and how serious the risks are of poorly secured products.

Kevin Veldman, Ethical Hacker at KIWA

10:30 – 10:55

A practical approach for developing secure and EU CRA ready embedded systems

This seminar offers a hands-on roadmap for developing secure embedded systems that are not only resilient to modern threats but also aligned with the evolving requirements of the EU Cyber Resilience Act (CRA). Through real-world examples and practical guidance, we will explore how to embed security throughout the product lifecycle, from design and development to deployment and maintenance, while ensuring regulatory readiness. Attendees will gain actionable strategies for implementing security-by-design principles, managing software supply chain risks, and leveraging automated tooling to streamline CRA compliance. This talk is tailored for engineers, security leads, and product managers working at the intersection of embedded development and regulatory oversight.

Giovanni Alberto Falcione, CTO exein SpA (on behalf of Logic Technology)

11:00 – 11:25

Holistic System engineering strengthened by GenAI

At Sioux, we tackle the complexity of modern systems through a holistic approach to system engineering. Our methodology centers on capturing information and abstractions across all engineering disciplines within models understood by everyone, enabling rapid identification of potential problems before they escalate. This integrated approach breaks down traditional silos between mechanical, electrical, software, and other engineering domains, creating a shared understanding that accelerates problem detection and resolution.

Generative AI represents the next step in this methodology, serving as a powerful accelerator that amplifies our engineering capabilities. We can process interdisciplinary data more efficiently, uncovering hidden dependencies between system components, and predict potential failure modes across multiple abstraction levels. This presentation will demonstrate how GenAI takes holistic engineering further, enabling even faster iteration cycles and ultimately more robust system designs by finding issues when they arise.

Robert Hendriksen, Sioux Technologies

read here the interview with Robert about model-driven simulations.

FHI, federatie van technologiebranches
nl_NLNederlands