ONEKEY invites you to their event

Secure Private Keys in Public Firmware: Best Practices for Embedded Trust

About this event

Private keys are at the heart of embedded security. They authenticate devices, secure communication, and safeguard software integrity. But when these keys are buried inside publicly distributed firmware – they become low-hanging fruit for attackers.

In this webinar we dive deep why private keys end up in firmware, what are the real-world incidents they’ve caused, and – most importantly – how to prevent that.

From Crypto Fundamentals to Real-World Risks

Learn the essentials:

  • Cryptographic basics
  • The anatomy of certificates, trust chains, and their role in authentication and signing

You’ll see where and why private keys appear in firmware through common use cases – and the pitfalls that make them leak.

Best Practices for Private Key and Certificate Management

Learn proven strategies to keep private keys protected across the entire product lifecycle:

  • Separating development/test certificates
  • Secure storage
  • Technical guidance

We’ll also tackle operational challenges like renewal, rotation, and lifecycle management – across different protocols.

Live Demo

You’ll see the ONEKEY Platform in action – scanning firmware, uncovering exposed keys, and delivering clear, actionable remediation steps.

What You’ll Take Away

  • Why keys leak into firmware – and their real-world impact
  • Practical crypto & PKI knowledge for embedded engineers
  • Secure key and certificate management techniques
  • How to handle renewal, rotation, and updates safely
  • Common mistakes to avoid
  • Detection, prevention, and remediation methods

By the end, you’ll have clear methods, practical tools, and the confidence to eliminate one of the most damaging – and most preventable – flaws in embedded security.

Can’t make it live? No worries—register now, and we’ll send you the on-demand recording.

Hosted by

  • Team member
    T
    Sebastian Schneider Sales Engineer @ ONEKEY

    Sebastian Schneider, has over a decade of experience as a Software Developer and Security Architect for embedded systems used in critical infrastructure. Now working as a Sales Engineer at ONEKEY; he uses his expertise to help clients find the best security solutions for their IACS.

  • Team member
    T
    Maximilian Kleemann Sales Manager @ ONEKEY

    In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.

ONEKEY

We automate software security & compliance of connected products at scale.

ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.