How do you know for certain that a router in your network has not been altered with since you deployed it? Wouldn\u2019t it be great if you can cryptographically challenge your router to provide its unique identity? In addition to this, what if the underlying OS provides a secure mechanism to detect if the software has been tampered with during boot time and runtime?\n\nTune in to this podcast to understand the aspects of establishing trust and the security features incorporated in both hardware and software to ensure the trustworthiness of IOS-XR platforms. With 5G deployments gaining traction, networks are being depended on as critical infrastructure. The new security features will ensure customers can validate the authenticity of their devices in both hardware and software.\n\nLearn more: www.cisco.com/go/spsecurity?dtid=opdcsnc00146 \n\nCisco Champion Hosts: \nDavid Penaloza Seijas (twitter.com/davidsamuelps), Verizon Business, Principal Engineer \nMark Sibering (twitter.com/netcicd), Devoteam, Principal Architect \nMichael Rhoades (twitter.com/ciscomikey), North American Hoganas, Manager IT \n\nGuest: \nRakesh Kandula, Cisco, Technical Marketing Engineer\n\nModerator: \nAmilee San Juan (twitter.com/amileesan1), Cisco, Technical Influencer Marketing and Cisco Champion Program \n\nFollow us on Twitter: twitter.com/ciscochampion