Flash Memory Summit 2014

Date Published: January, 01, 2015

Flash Memory Summit

August 5, 2014 – August 7, 2014

Santa Clara, CA

TCG members will present features and benefits of self-encrypting drive (SED) technology as used in SSDs for data and content protection. Trusted Computing Group storage and security experts will participate in two sessions:

  • Tuesday, August 5th at 3:15pm: Session 103-A, Flash Security: Back to the Future, offers panelists Michael Willett, Samsung; Bob Thibadeau, Wave Systems; Walt Hubis, Hubis Technical Associates; and Patrick Warley, Integral Memory.
  • Tuesday, August 5th at 4:25pm: Session 104-A, Security in a Flash, features a number of speakers addressing various aspects of self-encrypting drives and encryption. Matt Pujol, Hitachi Data Systems, will address “Enterprise Data Erasure” and Wei-Ti Liu, LucidPort, will talk about “How to Secure Storage Devices.”  Walt Hubis will discuss “The Impact of Emerging Storage Security Standards on Solid State Storage”, followed by Michael Willett on the topic of “Solid State Drives with Self Encryption: Solidly Secure”. Xinmiao Zhang, SanDisk, will address “VLSI Architectures for the AES Algorithm” followed by Hiroshi Watanabe, visiting scholar, MIT.

Return to events listing


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More