"Security is not only a top to bottom issue. It's also an end to end issue," Lee said.
It's easy to account for one device, but not the other, Lee said.
"There's no use if your cloud servers are secure, but those smartphones that act as a cloud are completely insecure," Lee said.
ARM's TrustZone has put the stake in the ground for mobile platform integrity, including how to set up wireless transmissions, authentication techniques and others, Lee said.
Engineers from Intel, AMD and ARM also talked about security enhancements at the hardware layers in PCs and servers. A lot of hardware security implementations are around secure execution layers, trusted domains and securing DRAM so private keys and cryptographic data can't be stolen in transit. Intel is bringing the ability to identify rootkits and polymorphic viruses at the hardware layer to its upcoming chips so malicious attacks can be identified before they wreak havoc on a system.
Not all hardware security features in PCs and servers will come to smartphones, which have limited processing capabilities due to power constraints, Lee said.
But system design is important, and the security features need to be chosen wisely.
"It's not easy to come up with a hardware patch, so you have to think ahead," Lee said
Sign up for CIO Asia eNewsletters.