Paul Roberts, Security Ledger, to Headline TCG RSA Conference 2015 Session April 20 with the 20-Story Snowcastle: Why We Need a New Foundation for the Internet of Things

Date Published: March, 04, 2015

There is no shortage of superlatives to describe the Internet of Things. Estimates put the number of connected devices at between 20 and 30 billion by the end of this decade. The downstream effects of that are hard to estimate – but they’re huge. In just one example: the McKinsey Global Institute estimates the impact of IoT on the global economy might be as high as $6.2 trillion by the year 2025.

And yet, many of our predictions about IoT adoption and growth are predicated on the belief that we can build an Internet of Things that works at least as well as the Internet of machines that has evolved over the last four decades. The problem with this is that, by and large, we are trying to build the Internet of Things on top of the older Internet of machines: relying on tools, technologies, platforms and protocols that are poorly suited to the scale and use cases that the IoT will present.

In a short talk to open the Trusted Computing Group RSA Conference 2015 association session on Monday, April 20, 9 a.m. – 1 p.m., Security Ledger Editor-in-Chief Paul Roberts will identify some of the pain points in our rapid transition to the Internet of Things and discuss some promising efforts (including those of TCG) to provide a robust, secure and scalable foundation on which a vibrant IoT might be built.

Roberts also will moderate a panel session on the role of trust and TPM, joined by Amy Nelson of Dell and Dave Bossio, Microsoft. This panel will be followed by one on the IoT and a third panel will examine mobile security.

The session also will include more than two dozen demonstrations of trust for security in a number of applications, from data protection to network security to IoT specific use cases.

For more information, go to:



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More