Trusted Computing Focus of 2015 Cybersecurity Innovation Forum

Date Published: August, 20, 2015

Sept. 9-11, Washington, D.C., practitioners of security along with vendors, standards experts and researchers will gather at the Cybersecurity Innovation Forum. Hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security, the conference includes four tracks over the three days, including trusted computing, security automation, cyber information sharing and research.

The event organizers promise not only talks, panels and keynotes but some live demonstrations.

Given the focus on both trusted computing and one of its focus areas, security automation, the agenda includes a number of talks and panels with TCG member experts from across the spectrum of TCG work groups.

On Wed., Sept. 9, the trusted computing track includes a talk by David Challener, Johns Hopkins University Applied Physics Laboratory on TPM 2.0, the new library specification that provides a number of new features and functions that  can be used across a range of devices for authentication, protection of keys and certificates and integrity checks and assurance.  Amy Nelson, Dell, will discuss enterprise management of self-encrpyting drives, or SEDs, a topic she discussed at this year’s RSA Conference.

Also on Wednesday, the security automation track includes a session with Lisa Lorenzin, Pulse Secure, “TCG TNC: Automating End-to-End Trust.” That session also includes a session around SWID tags. TCG recently addressed updates to its TNC specs for SWID tags which includes interoperability with both TCG and IETF specifications (more here).

Thursday, Sept. 10, a panel in the trusted computing track will cover vice identity and health, with discussion by Jessica Fitzgeral-Mckay, NSA; Lorenzin; and Greg Kazmierczak, Wave Systems. In the security automation track, Fitzgerald-McKay will also look explain evolving standards to meet cyber threats.

Also in that day’s session, Steve Hanna of Infineon will talk about security, trust and the Internet of Things. Dave Waltermire, NIST, will update attendees on NIST’s efforts around security automation.

For more info on these and additional sessions around Windows 10, security assurances and certifications, and cyber privacy and risk management issues, see the complete agenda:http://www.fbcinc.com/e/cif/agendagrid.aspx.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More