TCG RSA Session Feb. 29 Adds Well-Known ICS Expert Speaker; Amazing Give-aways; and Lots of Demos + Some Other Goodies

Date Published: February, 23, 2016

Media sponsors for this year’s event are Embedded Computing Design and the Security Ledger.

TCG RSA Session Feb. 29 Adds Well-Known ICS Expert Speaker; Amazing Give-aways; and Lots of Demos + Some Other Goodies

Next week’s Monday, Feb. 29 RSA session hosted by Trusted Computing Group will not only feature a keynote by Doug Cahill, ESG but three great panels, some 20+ demonstrations, an Ask the Expert session for the TPM but also a number of great prizes.

The session starts in Moscone West 2002 at 8:30 a.m. Monday and is open to any RSA badge holder, including those with Expo passes. Need a pass? Use code 16UTCGXPO to register at this link.

Following the keynote by Cahill based on new ESG research on the IoT and cloud security, Darin Andersen of CyberTech will lead a lively discussion about IoT vulnerabilities and the role of trust with Max Senges of Google and Lee Wilson, Security Innovation. All have extensive IoT and security hardware and software experience. The next panel will look at how to leverage the TPM in both enterprise and IoT applications, with Paul Roberts, the Security Ledger leading the panel with Paul England, Microsoft and Matthew Garrett, CoreOS.

Mark Schiller, TCG executive director, will briefly outline new initiatives by TCG in the IoT, embedded systems and the enterprise. Following his remarks, a third panel led by ICS expert Derek Harp, SANS Institute, with Steve Venema, PolyVerse and Tony Sager, The Center for Internet Security on securing the network.

Attendees will have the opportunity to win a number of prizes including self-encrypting drives from Intel and Micron; a sponsorship to the Drive Trust Alliance; a Raspberry Pi development kit; and the Google OnHub IoT gateway. Thanks to TCG members Infineon,
Micron, Drive Trust Alliance and Intel for their contributions.

Also, attendees also can talk with a co-author of the recently published book “A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”, from Apress; a limited nubmer of free print books will be available.

Demos will be open during the entire session and include secure network access control; data protection with self-encrypting drives in IoT devices; secure smart building; assurance of device integrity and health; Windows and open source support for the TPM across applications; and secure IoT gateways. Complete descriptions can be found here.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More