There is no shortage of superlatives to describe the Internet of Things. Estimates put the number of connected devices at between 20 and 30 billion by the end of this decade. The downstream effects of that are hard to estimate – but they’re huge. In just one example: the McKinsey Global Institute estimates the impact of IoT on the global economy might be as high as $6.2 trillion by the year 2025.
And yet, many of our predictions about IoT adoption and growth are predicated on the belief that we can build an Internet of Things that works at least as well as the Internet of machines that has evolved over the last four decades. The problem with this is that, by and large, we are trying to build the Internet of Things on top of the older Internet of machines: relying on tools, technologies, platforms and protocols that are poorly suited to the scale and use cases that the IoT will present.
In a short talk to open the Trusted Computing Group RSA Conference 2015 association session on Monday, April 20, 9 a.m. – 1 p.m., Security Ledger Editor-in-Chief Paul Roberts will identify some of the pain points in our rapid transition to the Internet of Things and discuss some promising efforts (including those of TCG) to provide a robust, secure and scalable foundation on which a vibrant IoT might be built.
Roberts also will moderate a panel session on the role of trust and TPM, joined by Amy Nelson of Dell and Dave Bossio, Microsoft. This panel will be followed by one on the IoT and a third panel will examine mobile security.
The session also will include more than two dozen demonstrations of trust for security in a number of applications, from data protection to network security to IoT specific use cases.
For more information, go to:https://trustedcomputinggroup.org/resources/rsa_conference_2015_tcg_association_seminar
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.