Tuesday, October 6, 2020
-
CDT
Vulnerability at the Edge
Join on HopinAutonomous edge systems, such as drones, face unique security challenges beyond traditional attack vectors. Extended operations with no connectivity, malicious attacks, inadequate training data, scenarios unanticipated in simulation and testing, and limited edge resources are some examples. Listen to industry experts discuss the attack vectors, vulnerabilities, and approaches to dealing with security of autonomous edge systems.
Download these images to your phone and post using the Instagram app.