Internet of Things, Trust and Security to be Focus of TCG RSA Conference 2016 Session Feb. 29
TCG once again will host its popular Monday session at the U.S. RSA Conference that will include three thought-provoking panels and a wide variety of demonstrations demonstrating the use of trust and standards for security in the enterprise and the Internet of Things.
The session “Securing the IoT with Trusted Computing” is planned for Monday, February 29, 8:30 a.m. – 12:30 p.m. at the RSA Conference 2016, San Francisco (#RSAC). After a quick update on trusted computing, Internet of Things security expert Darin Andersen, chairman and founder of CyberTECH, will lead a panel on increasing vulnerabilities in the IoT and whether trust might support better security. Andersen will be joined by Lee Wilson of Security Innovations and other panelists.
What is the role of the TPM in the IoT and how is it being used today? A second panel, moderated by Paul Roberts, founder and editor-in-chief, SecurityLedger, will look at the newest and best ways to implement the TPM. He will be joined by Paul England, software architect, Microsoft Corporation to examine new tools in Windows 10 and by director product management, security services, Andrew Cathrow of VeriSign, t look at how the TPM can be leveraged in a variety of applications.
Data breach and security expert Larry Ponemon, chairman and founder, Ponemon Institute will lead a third panel on securing the connection and will be joined by Doug Cahill, senior analyst, ESG and Steve Venema, senior architect of Polyverse Corporation, for a look at the issues related to connecting IoT devices and securing legacy and new network connections.
TCG members will also show attendees can see a number of applications of TCG standards and technologies in the IoT and enterprise. An expert on the TPM also will be available to talk about the specification and how it is implemented. More info can be seen here.
The TCG session is open to all those registering, including those with Expo passes, of the RSA Conference. Complementary Expo passes using the code 16UTCGXPO currently are available here.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.