We Cannot Trust the IoT; TCG to Speak at May IoT Developers Conference

Date Published: May, 05, 2016

By now, security experts, device makers and consumers are becoming aware that connected devices – from cars to baby monitors to wearables – are inherently insecure. The reasons for these vulnerabilities varies, but the result is the same: a stream of lost or stolen data, hacks and attacks that range from amusing to endangering critical infrastructure.

Embedding trust into devices can help. Later this month, May 25-26 at the IoT Developers Conference (ow.ly/4mX9zp), TCG’s co-chair of the Internet of Things subgroup Sung Lee will address how to use trust to better secure the IoT.

Lee’s talk on May 26, 3 p.m., will address the concept of trust and the Trusted Platform Module (TPM), which have been widely adopted in enterprise endpoints and networks for securing crypto keys, protecting private keys, securing authentication & protection against malware & attacks. Devices can implement assurance, health checks, authentication and other security functions. But these tools often are not available to developers of devices for the Internet of Things, where the cost, power, footprint & other considerations make traditional TPM implementations difficult or impossible. This talk will look at the unique requirements for security in IoT systems and infrastructure and the role of trust. Attendees will learn how functions offered by international standards can be applied & how they will be managed. Specific examples will be provided.

The conference is offering a discounted pass that includes access to tech talks, keynotes and sessions as well as lunch.  The pass is SB167; register at ow.ly/4mX9zp.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More