Flash Memory Sumit Sessions to Address SSD Security with Trusted Computing Group

Date Published: July, 01, 2014

What: Attendees of the Aug. 5-7 Flash Memory Summit will learn how to use standards-based encrypting solid state disk (SSD) drives to protect against data loss and theft.

Trusted Computing Group storage and security experts will participate in two sessions:

  • Session 103-A, Flash Security: Back to the Future, offers panelists Michael Willett, Samsung; Bob Thibadeau, Wave Systems; Walt Hubis, Hubis Technical Associates; and Patrick Warley, Integral Memory.
  • Session 104-A, Security in a Flash, features a number of speakers addressing various aspects of self-encrypting drives and encryption.

Matt Pujol, Hitachi Data Systems, will address “Enterprise Data Erasure” and Wei-Ti Liu, LucidPort, will talk about “How to Secure Storage Devices.” Walt Hubis will discuss “The Impact of Emerging Storage Security Standards on Solid State Storage”, followed by Michael Willett on the topic of “Solid State Drives with Self Encryption: Solidly Secure”. Xinmiao Zhang, SanDisk, will address “VLSI Architectures for the AES Algorithm” followed by Hiroshi Watanabe, visiting scholar, MIT.

When: Tues., Aug. 5, Security Track Sessions 103-A, 3:15, and 104-A, Security in a Flash, 4:25 p.m. (http://www.flashmemorysummit.com/English/Conference/Program.html)

Where:
Flash Memory Summit, Santa Clara Convention Center

The Flash Memory Summit program is designed to provide attendees with practical information on the current state of flash memory and its applications. The Summit Program consists of an all-day tutorial, panel discussions, keynotes, paper sessions, workshops and special sessions.

Website: To get more info or to register for the Flash Memory Summit, go to http://www.flashmemorysummit.com.

Tweet this: Stop data breaches with widely available encrypting drives. Learn more at Flash Memory Summit http://bit.ly/11Do3bV @flashmem @TrustedComputin #SEDs

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More