1. Introduction to CMMC 2.0 and Latest Trends
The role of CMMC in national defense and enterprise supply chains
Key requirements and levels of CMMC 2.0 (L1-L3)
2. Security risks and compliance challenges for Edge AI
The shift of AI computing from cloud to edge
Common cybersecurity threats to Edge AI devices (unauthorized access, data breaches, hardware implants)
CMMC regulates data protection in Edge AI environments
3. Building a CMMC compliant security architecture with Root of Trust (RoT)
Ensuring system integrity through FIPS 140-2 certified hardware encryption
Implementing identity authentication and device protection with MX+ solutions to meet CMMC requirements
4. End-to-End data protection and CMMC Compliance
Data at Rest (DAR): FIPS 140-2 L2/L3 encrypted storage to secure sensitive data
Data in Transit (DIT): Secure communication and end-to-end encryption via APIs to prevent middle attack
Data in Use (DIU) security mechanisms: Protecting AI models and inference results from unauthorized access
TOPIC / TRACK
AIoT & Hardware Security Summit
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone
LEVEL
General General sessions explore new
cybersecurity knowledge and
non-technical topics, ideal for those with limited or no
prior cybersecurity knowledge.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Hardware Security
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。