RSA Conference 2015: TCG Association Seminar

RSAC 2015 banner

When: Monday, April 20, 2015 9:00AM – 1:00PM
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)

Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions

Resources Available for Download:

Please visit https://twitter.com/TrustedComputin for up-to-date tweets regarding RSA. Use #RSAC and #TPM

Session Schedule:

[fusion_text]

Topic Speakers
Welcome and Introduction to the Trusted Computing Group (TCG) Dr. Joerg Borchert – President, Trusted Computing Group
20-Story Snow Castle: Why We Need a New Foundation for the Internet of Things Paul Roberts, Founder and Editor and Chief, Security Ledger
Panel: Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise Moderator: Paul Roberts, Security Ledger
Panelist:

  • Amy Nelson, Engineering Technologist, Security Software Technical Planner, Dell
  • David Bossio, Group Program Manager, OSG Enterprise and Security R&D, Microsoft
Panel: The Insecure Internet of Things and How to Secure It Moderator: Rich Nass, Executive Vice-President, Embedded-Computing.com, OpenSystems Media
Panelist:

  • Stacy Cannady, Engineer Technical Marketing Security & Trust Organization, Cisco Systems
  • Darin Andersen, Founder, CyberUnited
  • Chuck Benson, Assistant Director of IT, Facilities Service, University of Washington
Panel: Mobile is King, But Security Must Be a Priority Moderator: Jai Vijayan; Technology Editor/Writer
Panelists:

  • Gil Bernabeu, Technical Director, GlobalPlatform
  • Lee Neely, Senior Cyber Analyst, Lawrence Livermore National Laboratory (LLNL)
  • Jon Geater, Chief Technology Officer, Trustonic

Demonstration Showcase Participants:

[fusion_text]

trustParticipant Topic
software image Endpoint Compliance with Self-Encrypting Drives (SEDs)
Artec Logo Secure your Data with TPM
Cisco LogoHSR LogInfineon logotrusting iot Securing IoT with Trusted Computing
Cososys Logo Quitting the Gamble of Trusting Insiders with Corporate Data
trustHsH logo Near Real-Time Network Security with an IF-MAP-Based SIEM Approach
Dell Logo Dell Data Protection | Host Crypto Accelerator (HCA) and TPM Integration
Fraunhofer SIT Logo Establishing Trust with Embedded Actuators in the IoT
Fujitsu Logo Remote Firmware Update for Vehicle ECU with a TPM
Huawei Logo Trusted Computing in Network Device
Integrity Security Services Logo Trusted Device Lifecycle Management for End-to-End Security
trusting iot Intel Security Critical Infrastructure Protection (CIP) – For Managed IoT Security
trusting iot TPM 2.0 Family Enabling for Linux
trusting iot Cloud Data Security Gateway
jwsecur JW Secure Strongnet Secure Admin
Microsoft Logo Microsoft Windows Internet of Things – Trusted I/O
DECOIT GmbHHsH LogoPulse Secure Logo BYOD Solutions Well in Hand: Standards-Based Mobile Security
Pulse Secure LogoRebasoft logo Breach Containment: Standards-Based Security Automation for Coordinated Threat Control
Swisscom LogoIntel Corporation Using TCG Technologies in a Real World Cloud Setup
Tempered Network LogoPulse Secure Logo Dynamic Overlay Protection for Industrial Control Systems
Wave Logo Wave Virtual Smart Card 2.0: Two-Factor Authentication with TPM
Wave Logosamsung The Fast, Risk-free Way to Deploy SEDs: Wave Cloud
winmagic logoMicron Logo SED Management with TPM Protection