Learn to Use New Trusted Computing Software Stack in Webcast Feb. 15, 2018

Date Published: January, 05, 2018

On Feb. 15, 10:00 a.m. Pacific/1:00 p.m., TCG will host a webcast on using the new TCG software stack for securing devices and data.

Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

The TCG Software Stack is a software specification that provides a standard API for accessing the functions of the TPM. Application developers can use this software specification to develop interoperable client applications for more tamper-resistant computing.

Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security’s TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security’s post-quantum cryptography (NTRU and pqNTRUsign).

Register here: https://www.brighttalk.com/webcast/7423/297251?utm_source=Trusted+Computing+Group&utm_medium=brighttalk&utm_campaign=297251.

More info on the software stack supporting the TPM is here: https://trustedcomputinggroup.org/work-groups/software-stack/


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More