In our latest blog, Nicole Kostopoulos reflects on two very different industry events, Embedded World 2026 and ISC West, and how, together, they revealed a single, unifying truth: you cannot run security operations on devices that aren’t secure, and you cannot build connected systems without embedded security at their core.
Why Security Can’t Exist Without Embedded Trust. Two Events, One Perspective Shift
Embedded World Nuremberg and ISC West in Las Vegas could not look more different at first glance.
In Nuremberg, Embedded World brought together the embedded systems community to explore how devices are becoming more connected, more autonomous, and increasingly driven by AI. Conversations focused on silicon, architecture, lifecycle resilience, and how embedded security must evolve alongside innovation.
In Las Vegas, ISC West, by contrast, offered a view from the outside in. As the world’s leading event for physical security, it showcased cameras, access control systems, monitoring infrastructure, and large‑scale security operations designed to protect people, assets, and environments.
But taken together, these two events told a much bigger story.
Embedded World Reinforced the Other Half of the Equation
At Embedded World, the conversation naturally started deeper in the stack.
Discussions with device manufacturers, silicon vendors, and system integrators focused on how security must be considered early in design and sustained throughout the product lifecycle. Embedded security was no longer framed as a single development milestone, but as a continuous responsibility, from architecture definition and hardware evaluation through deployment, updates, and post‑market reassessment.
Across the show floor, a consistent message emerged: you cannot build modern connected products without embedded security, especially as AI and autonomy move devices closer to real‑world decision‑making.
Fast-forward two weeks for the ISC West perspective in Las Vegas…
The Outside‑In Reality: Physical Security Depends on Embedded Security
ISC West made one thing abundantly clear: physical security systems are only as strong as the embedded devices they rely on.
Cameras, sensors, access readers, and controllers may form the visible layer of security operations, but if the devices themselves are insecure, the entire system can be compromised. A hacked camera, a vulnerable controller, or an unprotected edge device doesn’t just fail quietly; it becomes an attack surface.
This is where the perspective from ISC West becomes critical. Physical security may be about protecting the outside world, but without embedded security inside the device, that protection breaks down.
You cannot run security operations if the devices themselves are not secure.
One Unified Message
Taken together, Embedded World and ISC West delivered a clear, unified message:
You cannot run security operations on insecure devices,
and you cannot build devices without embedded security.
Physical security and embedded security are not separate disciplines. They are interdependent layers of the same trust foundation. One without the other creates risk, exposure, and long‑term fragility.
Secure Autonomy at the Edge: Demonstrating Real-World Use Cases
A major highlight of both events was KLARQ, Kudelski Labs’ autonomous robotic platform, which served as the main attraction on our booths. Much like at CES earlier this year, KLARQ once again proved to be a powerful way to bring conversations about embedded security, autonomy, and Edge AI into the real world.
In parallel, our partner Axelera also showcased KLARQ on their own booth, demonstrating how Kudelski Labs’ security capabilities integrate with high performance Edge AI hardware and inference engines. Seeing KLARQ featured across both booths reinforced the shared message that security and AI acceleration must work together to support real-world autonomous systems.
Across both demonstrations, KLARQ illustrated how secure activation, real time threat detection, and security first design principles can be applied in a tangible Edge AI use case. As systems become more autonomous and AI-driven, operating at the network edge, trust in the underlying embedded security architecture becomes critical, not only for compliance, but also for operational reliability and safety.
Why Long‑Term Trust Matters More Than Standalone Security
Taken together, Embedded World and ISC West highlighted an important reality: security only creates long‑term value when it is treated as a foundation, not a feature.
When security is approached in isolation, it risks being seen as something to add late in the process rather than something to design for longevity. But the systems we rely on every day, from connected devices to physical security infrastructure, demand a different approach.
The real value lies in thinking beyond individual components and focusing on the full lifecycle: supporting devices over time, managing risk as systems evolve, and ensuring they remain trustworthy years, even decades, after deployment.
Security may open the door, but long‑term value comes from the partnerships that help organizations build resilient products, protect trust in real‑world environments, and avoid the hidden costs of insecure design.
Looking Ahead
Embedded World and ISC West confirmed what many product teams are already experiencing: security expectations are rising, regulatory landscapes are evolving and tightening, and embedded systems are becoming more complex.
The conversations we had reinforced the importance of:
- Integrating security early in design
- Reassessing security throughout the product lifecycle
- Aligning technical security efforts with certification and regulatory requirements
Kudelski Labs works with partners and customers to support secure, resilient embedded systems, from silicon to deployment and beyond. If you’d like to learn more, explore a partnership, or see how our solutions can support your next product innovation, contact us or visit our website for more information. We’d love to continue the conversation!