Jen-Wei Yeh, Ph.D.

Enova Technology Corporation / Product Manager

Product Manager at Enova Technology, leading the development and strategy for innovative tech products.


SPEECH
4/17 (Thu.) 11:30 - 12:00 4F AIoT & Hardware Security Zone AIoT & Hardware Security Summit
「Edge Security in the AIoT Era: RoT Provides The Best Hardware Protection」

1. Introduction to CMMC 2.0 and Latest Trends

 The role of CMMC in national defense and enterprise supply chains  

 Key requirements and levels of CMMC 2.0 (L1-L3)  


2. Security risks and compliance challenges for Edge AI 

 The shift of AI computing from cloud to edge  

  Common cybersecurity threats to Edge AI devices (unauthorized access, data breaches, hardware implants)  

  CMMC regulates data protection in Edge AI environments  


3. Building a CMMC compliant security architecture with Root of Trust (RoT) 

  Ensuring system integrity through FIPS 140-2 certified hardware encryption  

  Implementing identity authentication and device protection with MX+ solutions to meet CMMC requirements  


4. End-to-End data protection and CMMC Compliance

  Data at Rest (DAR): FIPS 140-2 L2/L3 encrypted storage to secure sensitive data  

  Data in Transit (DIT): Secure communication and end-to-end encryption via APIs to prevent middle attack  

  Data in Use (DIU) security mechanisms: Protecting AI models and inference results from unauthorized access