Resources
>
Events
>
ONEKEY Webinar: How to Achieve SBOM Transparency for RTOS-Based Devices

ONEKEY Webinar: How to Achieve SBOM Transparency for RTOS-Based Devices

ONEKEY Webinar: How to Achieve SBOM Transparency for RTOS-Based Devices
Tanja Sommer

READY TO UPGRADE YOUR RISK MANAGEMENT?

Make cybersecurity and compliance efficient and effective with ONEKEY.

Book a Demo
Tanja Sommer

Tanja Sommer
tanja.sommer@onekey.com

Join us for an exclusive ONEKEY webinar on February 26, 2026, at 11:00 a.m. (CET)!

Real-Time Operating Systems (RTOS) power millions of connected devices across industrial, medical, automotive, and IoT environments.

Yet for many manufacturers and security teams, RTOS firmware remains a black box.

Often delivered by OEMs, inherited from legacy projects, or provided without source code, RTOS firmware offers little transparency into the software components it contains. This lack of visibility makes it difficult to generate reliable SBOMs, track vulnerabilities, and meet growing regulatory requirements such as the RED Delegated Act and the Cyber Resilience Act (CRA).

In this 45-minute webinar, we will show how enhanced binary analysis enables full component visibility inside RTOS firmware — including kernel versions, crypto libraries, network stacks, and standard libraries —without requiring source code.

You will learn:

  • Why RTOS firmware is traditionally opaque
  • Why limited visibility creates compliance and security risks
  • How automated component detection works at the binary level
  • How to generate SBOMs directly from compiled RTOS firmware
  • How to map vulnerabilities to previously hidden components

The session will include a live demonstration of analyzing a RTOS firmware image and generating a complete SBOM.

If you rely on RTOS-based devices and need better visibility for security and compliance, this webinar is for you.

Don’t miss your chance to discover how to achieve SBOM Transparency for RTOS-Based Devices and learn how automated component detection works and how to map vulnerabilities to previously hidden components.

Can’t join live? No problem — register now, and you’ll receive the on-demand recording afterward.

See Event Here

Meet us there

ONEKEY Webinar: How to Achieve SBOM Transparency for RTOS-Based Devices

Speaker

ON-SITE TEAM

Maximilian Kleemann

Maximilian Kleemann

Team Lead Sales

In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.

Quentin Kaiser

Quentin Kaiser

Lead Security Researcher

Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.

Share

RELATED Events

Meet ONEKEY at the EUCA Conference 2026
Meet ONEKEY at RSAC 2026
ONEKEY Webinar: Integrate CRA Risk Management into Automated DevSecOps Workflows

About Onekey

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

CONTACT:
Sara Fortmann

Senior Marketing Manager
sara.fortmann@onekey.com

euromarcom public relations GmbH
team@euromarcom.de

Make cybersecurity and compliance efficient and effective with ONEKEY.