TCG Talks Internet of Things, Trust and Security at Security of Things Forum September 10

Date Published: August, 28, 2015

It seems like very day brings a different story about a hack or attack on the Internet of Things, or IoT. The number of connected devices, whether wearables or industrial control systems, has exploded but security has not kept pace. Many in the industry are looking for solutions. On Sept. 10, Cambridge, Mass., long-time security watcher and founder of SecurityLedger.com, Paul Roberts, has organized a great line-up of experts to talk about implications of the Internet of Things and related security issues.

The Security of Things Forum is co-hosted by the Christian Science Monitor Passcode – a great read for security and privacy issues – and will feature a cross-section of speakers, including TCG’s own Stacy Cannady, Cisco, who has been deeply involved in the intersection of computing, trust and security for some time.

Chris Valasek, IOActive and known recently for his work in automotive security, will be among those discussing the holes and potential solutions for IoT security.  Julie Brill, U.S. Federal Trade Commission, will address that agency’s take on consumer privacy issues and data security; other sessions will examine Java and its use in autos; managing patches in the IoT; the role and vulnerabilities of infrastructure in the IoT; and more.

The program is available here,http://www.securityofthings.com/#tile_schedule_anchor.

TCG also will provide a demonstration of a smart building secured with industry standards and technologies including TCG’s TPM and Trusted Network Communications protocols to secure data from devices, sensors and the cloud. More on that demo is available here.

TCG also has recently published a guide to IoT security, with input from industry. That document can be found here.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More