Participation Recognition

TCG Annual Award Program Honorees at the awards ceremony, October 2017.
From left (Back row): Guy Fedorkow, Philip Tricca, and Andreas Fuchs
From left (Front row): Michael Cox, Monty Wiseman, and Carey Huscroft

2017 Frank Molsberry Distinguished Service Award

Monty Wiseman, General Electric

Monty is currently a Principle Engineer at General Electric and the co-chair of both the Infrastructure Work Group and Industrial Sub Group within TCG. Monty was recognized with the 2017 Frank Molsberry Distinguished Service Award for his tenure with TCG, extended contributions to multiple work groups, and unending willingness to get involved with specifications across TCG. In his time with TCG, he has been a key contributor to PC Client specifications, TPM 1.0, 1.1b, 1.2, and 2.0 specifications, and more.

2017 Leadership Award

Andreas Fuchs, Fraunhofer, SIT

Andreas has been an active member with TCG since 2009 and has participated in over ten TCG work groups were he has provided input on the TPM 2.0 specification. He is an active member of the Trusted Software Stack work group and has contributed to TrouSerS 1.2 and founder of the German “Taskforce Trusted Computing,” focused on the practical distribution of trusted computing technologies in society and industry.

Carey Huscroft, HP Inc.

Carey has been the Technical Committee chair since 2013 and a member of the Committee since 2007. He was the Server Specific Work Group chair for ten years where he was very active in forming base concepts and architectural components for Virtualized Platforms. He is currently focused on continuing interactions and building chances for collaboration between the TC and the Board; fostering TC and Work Group communication; facilitating TCG technical leadership through meaningful collaboration (e.g., in the Work Group Chair Council); continuing the high-quality of TCG technical publications.

2017 Key Contributors

Philip Tricca, Intel Corporation

Philip is a software architect and engineer working in Intel’s platform security division. His career began with a 7-year stint in a U.S. Air Force research lab working with open source Linux security technology including mandatory access control systems like SELinux and measured boot using the TPM 1.2 devices. He then transitioned to the private sector working for Citrix integrating the Xen hypervisor with various platform security technologies. Most recently Philip has found his way to Intel where his current responsibilities include transforming Intel’s open source implementation of the TPM2 Software Stack (TSS2) from proof of concept to a vibrant and sustainable OSS project.

Keiko Hasegawa, Invited Expert

Keiko has been a co-chair of the Japan Regional Forum since 2012. Her dedication to JRF as a core contributor to the JRF has been widely recognized and as an advocate of TCG as a whole, she has been key in outreach to the Japanese government and is a sincerely dedicated member of the organization.

Guy Fedorkow, Juniper Networks

Guy received his BASc and MASc in Engineering Sciences at the University of Toronto and went on to develop both communications and high-throughput parallel computer architectures at Bolt, Beranek and Newman in Cambridge, MA, Cisco Systems and Juniper Networks, where he has served as system architect for a number of communications products. Guy is currently working on infrastructure security and trusted computing topics at Juniper Networks.

Dennis Mattoon, Microsoft

Dennis is the chair of the DICE Work Group and active in promoting new TCG technologies worldwide at industry events. He has contributed a number of TCG efforts including DRTM, TPM 2.0 Reference Implementation development, TSS maintainer (Microsoft Research) and helped drive enablement and adoption of TPM 2.0 in the industry.

Michael Cox, OnBoard Security

Michael worked for 8 years at Lockheed Martin before joining NTRU Cryptosystems. At NTRU and later Security Innovation and OnBoard Security, he has been a software developer, implementing the NTRU algorithm for a variety of embedded systems, working on the Aerolink security library for secure V2V messaging in the automotive space, and developing both the NTRU/Security Innovation 1.2 TSS and the OnBoard Security 2.0 TSS. Michael did his CS undergraduate work at Williams College and his masters work at Cornell University.

Michael has been an active member of the Trusted Computing Group for thirteen years, primarily in the Trusted Software Stack working group, contributing to the 1.2 and 2.0 TSS specifications as well as supporting tutorials and technology demonstrations.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.