Microsemi Security Solutions and Threat Driven Security
Jim Gallagher - Microsemi
Jan 13, 2016Size: 174.0MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThreat-driven security is a systematic system-level approach that is driven by a clear understanding of the security need – it is not arbitrary application of security technologies based on their perceived effectiveness or hype. Using this systematic approach, the strength of a protection is easily gauged through simple identification of the weakest link in the design. This presentation will review our approach to identifying security vulnerabilities, determining viable mitigations, and developing a threat tree that leads to a robust threat-driven protection.
About the Speaker
Jim joined Microsemi as Vice President of Engineering for Security Solutions in August 2009. Jim leads the development of software, firmware, crypto, and security products and services to prevent reverse engineering and product tampering. Jim has nearly 30 years of experience in real-time embedded software and system development, with a strong focus on software process implementation. Prior to joining Microsemi, Jim began his career with General Motors holding numerous software and systems assignments. Jim holds a Bachelor of Science degree in Electrical Engineering from the University of Notre Dame and a Master of Software Engineering degree from Carnegie Mellon University.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.