February 24, 2014 – February 28, 2014
Moscone Center, San Francisco, CA
Get Proactive with Security: A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires
[fusion_text]
Participant | Topic | Video |
---|---|---|
Welcome and Introduction to the Trusted Computing Group (TCG) | Dr. Joerg Borchert – President, Trusted Computing Group | |
Panel: Endpoint Compliance and Security Automation | Moderator: Jon Oltsik – Senior Principal Analyst, Enterprise Strategy Group (ESG) Panelists: Steve Whitlock – Chief Security Architect, The Boeing CompanyDan Griffin – Founder, JW Secure and Microsoft Enterprise Security MVPDave Waltermire – Security Automation Architect, NIST |
|
Panel: Will the Real Trusted Platform Module (TPM)Please Stand Up? | Moderator: Paul Roberts – Editor in Chief and Founder, The Security Ledger Panelists: Gal Shpantzer – Security Consultant and Analysts , SANS, Monty Wiseman – Security Researcher, Intel CorporationDustin Ingalls – Partner Group Program Manager, Windows Security, Microsoft |
|
Panel: Mobile Device Security: Fact or Fiction | Moderator: Victor Wheatman – Global Information Security Market Analyst and Enterprise Advisor Panelists: Eric Green – SVP, Business Development, Mobile Active Defense & Program Director, SC World CongressRick Doten – Chief Information Security Officer, DMI, Inc.Jason Conyard – Information Technology Vice President – Juniper Networks |
Participants | Topic | ||
---|---|---|---|
Endpoint Compliance & Self-encrypting Drives | |||
Practical Network Segmentation for Industrial Control System Security | |||
Mobile BYOD Security | |||
Near Real Time Network Security with Open Source Tools | |||
TPM Software Stack (TSS) System API | |||
Data Protection in a BYOD World: Security Automation | |||
Solid-State Drives with Self-encryption: Solidly Secure | |||
Endorsement Credentials for TPM Mobile | |||
Enhanced Embedded System Security Solutions Using TPMs | |||
User and Device Identity Solutions: Virtual Smart Cards | |||
SED Management wtih HP Drive Encryption | |||
Security Automation Made Easy with Enterprise Drives |
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.