4/17 (Thu.) 11:30 - 12:00 4F AIoT & Hardware Security Zone

「Edge Security in the AIoT Era: RoT Provides The Best Hardware Protection」

1. Introduction to CMMC 2.0 and Latest Trends

 The role of CMMC in national defense and enterprise supply chains  

 Key requirements and levels of CMMC 2.0 (L1-L3)  


2. Security risks and compliance challenges for Edge AI 

 The shift of AI computing from cloud to edge  

  Common cybersecurity threats to Edge AI devices (unauthorized access, data breaches, hardware implants)  

  CMMC regulates data protection in Edge AI environments  


3. Building a CMMC compliant security architecture with Root of Trust (RoT) 

  Ensuring system integrity through FIPS 140-2 certified hardware encryption  

  Implementing identity authentication and device protection with MX+ solutions to meet CMMC requirements  


4. End-to-End data protection and CMMC Compliance

  Data at Rest (DAR): FIPS 140-2 L2/L3 encrypted storage to secure sensitive data  

  Data in Transit (DIT): Secure communication and end-to-end encryption via APIs to prevent middle attack  

  Data in Use (DIU) security mechanisms: Protecting AI models and inference results from unauthorized access 

Jen-Wei Yeh, Ph.D.
SPEAKER
Enova Technology Corporation
Product Manager

TOPIC / TRACK
AIoT & Hardware Security Summit

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone

LEVEL
General General sessions explore new cybersecurity knowledge and non-technical topics, ideal for those with limited or no prior cybersecurity knowledge.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Hardware Security