How Do Embedded and IoT Designers Think About Security? TCG and Embedded Computing Design Look at the Survey Data

Date Published: March, 20, 2017

Earlier this year, Embedded Computing Design with TCG conducted a survey of more than 250 embedded and IoT developers and designers to learn more about how they view, plan and implement security.

Not surprisingly, many are concerned about security and see it as important. But they’re still figuring out how to implement it and where security is integrated into the complex ecosystem that often includes data, connectivity and endpoints.

On April 24, Richard Nass, ECD brand director, and Stacy Cannady, TCG, will talk about the results of the survey and why they’re relevant to designers and developers. The webcast will look at emerging trends and challenges to security, as well as how security can be implemented potentially in a number of embedded and IoT applications.

Join Rich and Stacy and bring your questions. You can register for the April 24 webcast here, Registrants also will get a report with data and findings.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More