ONEKEY Webinar: How to Achieve SBOM Transparency for RTOS-Based Devices

READY TO UPGRADE YOUR RISK MANAGEMENT?
Make cybersecurity and compliance efficient and effective with ONEKEY.
.avif)
Tanja Sommer
tanja.sommer@onekey.com
Join us for an exclusive ONEKEY webinar on February 26, 2026, at 11:00 a.m. (CET)!
Real-Time Operating Systems (RTOS) power millions of connected devices across industrial, medical, automotive, and IoT environments.
Yet for many manufacturers and security teams, RTOS firmware remains a black box.
Often delivered by OEMs, inherited from legacy projects, or provided without source code, RTOS firmware offers little transparency into the software components it contains. This lack of visibility makes it difficult to generate reliable SBOMs, track vulnerabilities, and meet growing regulatory requirements such as the RED Delegated Act and the Cyber Resilience Act (CRA).
In this 45-minute webinar, we will show how enhanced binary analysis enables full component visibility inside RTOS firmware — including kernel versions, crypto libraries, network stacks, and standard libraries —without requiring source code.
You will learn:
- Why RTOS firmware is traditionally opaque
- Why limited visibility creates compliance and security risks
- How automated component detection works at the binary level
- How to generate SBOMs directly from compiled RTOS firmware
- How to map vulnerabilities to previously hidden components
The session will include a live demonstration of analyzing a RTOS firmware image and generating a complete SBOM.
If you rely on RTOS-based devices and need better visibility for security and compliance, this webinar is for you.
Don’t miss your chance to discover how to achieve SBOM Transparency for RTOS-Based Devices and learn how automated component detection works and how to map vulnerabilities to previously hidden components.
Can’t join live? No problem — register now, and you’ll receive the on-demand recording afterward.
Meet us there

Speaker
ON-SITE TEAM

Maximilian Kleemann
In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.

Quentin Kaiser
Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.
RELATED Events

Meet ONEKEY at the EUCA Conference 2026
Learn how to become CRA-ready and compliant with ONEKEY. Meet us in Brussels – book your meeting now!
About Onekey
ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

CONTACT:
Sara Fortmann
Senior Marketing Manager
sara.fortmann@onekey.com
euromarcom public relations GmbH
team@euromarcom.de
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.


