When: Wednesday, November 6, 2013 10:00am PT
Length: 60 minutes
The PowerPoint Presentation of the Webcast is Available Here.
Businesses are under attack — and the frequency and severity of the resulting breaches continues to escalate. No one is immune, and the odds of success remain in attackers’ favor. A single employee, clicking on a link in a phishing email, can be all an attacker needs to establish a beachhead inside an enterprise network that can be used to steal secrets or sabotage systems.
This webcast, based on a new Architect’s Guide, shows enterprise security architects how they can design and deploy successful, highly auto- mated security solutions based on open architecture and standards to solve today’s most pressing cybersecurity challenges.
Attendees will hear from leading security experts who will address critical strategies they can implement now. Attendees also will learn how to assess their security state and what role standards-based solutions can play in improving security to prevent inevitable attacks.
Atul Shah is a Senior Security Strategist at Microsoft Corporation. With 15+ years of experience in IT security industry, he has been involved in several aspects of IT security from product development to managing core IT infrastructure services for Microsoft’s global business. Today, Atul drives the End to End Trust initiative, which seeks to create a safer, more trusted internet. His efforts include creating trusted mechanisms for evaluating and attesting to the state of the devices connecting to the internet, investigating and solving cloud related security, privacy and jurisdictional issues that impact businesses and consumers. Atul is a frequent public speaker on strategies for reducing Internet threats such as identity theft, improving device health and proactive protection strategies to reduce the risks of malware.
Steve Hanna is a Distinguished Engineer at Juniper Networks. As co-chair of the Trusted Network Connect Work Group in the TCG and the Network Endpoint Assessment Working Group in the IETF, Steve has a deep and broad understanding of Network Access Control technology. He is the author of many papers, an inventor or co-inventor on 34 issued patents, and a regular speaker at industry events.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.