Security can no longer be an afterthought or a patch. It needs to be there from the very beginning of the design of your application. By simplifying the configuration of security, from the Root of Trust and key storage on your secure device, to the creation of security profiles and projects, you will be able to take complete control of your security development workflow and ensure trust in your next application. This session will show how integrate security into an existing workflow of development, debugging, mastering and manufacturing. The session will go through the steps necessary for creating a secure application in a straightforward way, leveraging the secure hardware built into next-generation microcontrollers to provide the low-level trust anchors and secure services needed for trustworthy IoT solutions.