Get in Touch

(508) 921-4600
Email Sales
Email Support

UEI Europe Office
+49 40 63698136
Email EU Sales

Visit this page for local offices and distributors.

Webinar | Thurs. Nov. 9, 2023 @ 10AM EST | Aerospace Cybersecurity Solutions: Lock It Down Before You Send It Up!



  • Erik Goethert, Sr. Director of BD & Strategic Marketing, United Electronic Industries
  • Colin Duggan, Founder/CEO, BG Networks, Inc.


With the increasing adoption of more complex electronic systems, larger code bases, and network connectivity, the threat surface for Aerospace applications is growing significantly. Cybersecurity has become paramount to managing operational and safety risks of avionics systems overall and even for devices at the edge such as data acquisition and control hardware. DO-326a calls for the assessment or risk in avionics systems. When the operational and safety aspects of cyber-physical hardware at the edge are considered in a risk assessment, naturally a Zero-Trust set of controls emerge. Zero-Trust at the edge is good approach to managing cyber-risk and to help ensure the safety and efficiency of flight operations.

An overlooked aspect of securing systems is key management which is particularly difficult when it comes to embedded systems. All the right risk-based decisions could be made with respect to securing attack paths, but if secure key management is not considered, those controls will be easily compromised.

In this webinar, you will gain valuable insights into safeguarding critical data acquisition and control systems, ensuring the continued safety and reliability of aerospace operations while keeping ahead of evolving cyber risks.

Attendees will learn:

  • Why a risk-based approach to cybersecurity, such as that called for by DO-326a, makes sense
  • How to reduce cyber-risk in avionics data acquisition and control hardware
  • Naturally, how a Zero-Trust implementation emerges for these systems when they are managing critical data and control critical flight systems
  • Resulting security controls in hardware and in a full stack software implementation from a hardware root of trust to access control
  • The challenges of key management for avionics systems at the edge and how to address them.