TCG Webcast June 7 to Show Protection of Intellectual Property in the Internet of Things

Date Published: May, 31, 2016

What:              Trusted Computing Group (TCG) and members from Infineon and WIBU Systems will discuss how to protect intellectual property in the Internet of Things during a free webcast.

 

The webcast will explain how attackers exploit software vulnerabilities to create counterfeit products, sabotage data or steal information. Experts then will address solutions to protect such data and show attendees specific examples of using widely vetted industry standards and products to prevent such attacks.

 

When:             Tuesday, June 7, 2016, 12:00 p.m. Eastern/9:00 a.m. Pacific. The webcast also can be replayed with registration.

 

Where:            BrightTalk will host the webcast. Register for the free event here:

                        https://www.brighttalk.com/webcast/7423/206021

Website:         More information and the organization’s specifications are available at the Trusted Computing Group’s website, trustedcomputinggroup.org.

 

CONTACT:    Anne Price, PR Works, Inc.

1-602-330-6495

[email protected]

Twitter: @TrustedComputin

LinkedIn:

http://www.linkedin.com/groups/Trusted-Computing-Group-4555624

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More