About this event
Private keys are at the heart of embedded security. They authenticate devices, secure communication, and safeguard software integrity. But when these keys are buried inside publicly distributed firmware – they become low-hanging fruit for attackers.
In this webinar we dive deep why private keys end up in firmware, what are the real-world incidents they’ve caused, and – most importantly – how to prevent that.
Learn the essentials:
You’ll see where and why private keys appear in firmware through common use cases – and the pitfalls that make them leak.
Learn proven strategies to keep private keys protected across the entire product lifecycle:
We’ll also tackle operational challenges like renewal, rotation, and lifecycle management – across different protocols.
You’ll see the ONEKEY Platform in action – scanning firmware, uncovering exposed keys, and delivering clear, actionable remediation steps.
By the end, you’ll have clear methods, practical tools, and the confidence to eliminate one of the most damaging – and most preventable – flaws in embedded security.
Can’t make it live? No worries—register now, and we’ll send you the on-demand recording.
Hosted by
Sebastian Schneider, has over a decade of experience as a Software Developer and Security Architect for embedded systems used in critical infrastructure. Now working as a Sales Engineer at ONEKEY; he uses his expertise to help clients find the best security solutions for their IACS.
In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.