Registration is Open!
Don’t miss How to Steal Ai Algorithms at the Edge – and Protect Them, happening next week on Tuesday, July 15, virtually.
Ai algorithms are increasingly deployed at the edge alongside sensitive data and models, making them prime targets for tampering, reverse engineering, and theft. While board-level hacking is widely understood, microelectronics tampering is far more complex, harder to detect, and potentially devastating.
Why Attend?
- Why your Ai, IP, data, and sensors may not be as secure as you think
- Commercial and defense applications that can be at risk: Tesla and MQ-9
- Microelectronics attack methods: side-channel, beam attacks, delayering, and more
- Why domestic manufacturing alone doesn’t guarantee security
- How weaknesses in commercial security can escalate to national security threats
- How secure microelectronics are being developed to better protect Ai systems and intellectual property
Save your virtual seat!
Speaker Panel
Moderator

Tony Trinh
Senior Director, Advanced Concepts
Mercury Systems
Panelists

Dr. Wayne Churaman
Computing Technical Executive Area Lead
U.S. Army Research Laboratory Microelectronics Commons Secure Edge/IoT

William Zortman
DAHCS Campaign Manager
Sandia National Laboratories’ Laboratory Directed Research and Development Office

Jon Mellott
Fellow Chief Engineer for Secure Products
Mercury Systems
Past Events
Watch ETI content, including our webinars, Tech 101 educational events, and Emerging Tech Horizons podcast series, on our YouTube channel.
What is ETI?
NDIA’s Emerging Technologies Institute (ETI) is a non-partisan institute focused on technologies that are critical to the future of national defense. ETI provides research and analyses to inform the development and integration of emerging technologies into the defense industrial base. For more information on ETI activities, visit our website and YouTube page.


