TCG, in partnership with Embedded Computing Design at electronica Stand C3-509 in the Embedded area, will host demonstrations of trusted computing for industrial IOT and embedded device security with Micron, Mocana, Onboard Security, and Wibu-Systems. These members will show attendees how to implement the DICE lightweight root of trust, TPM and TCG Software Stack to protect data, networks and devices against attacks and to ensure integrity and health.
TCG experts on these topics will also speak in the electronica Industrial Forum, Hall C3, stand 534.
Mocana’s Keao Caindec, VP of Marketing, will address “Secure Root of Trust Using External Flash”. In this presentation, you’ll learn about common attack vectors on industrial IoT equipment and how defend against them by implementing the Trusted Platform Module 2.0 technologies to ensure the highest level of authentication assurance using a hardware-based, cryptographic root of trust.
Additionally, Mocana will partner with Infineon on a demonstration titled How to Protect Industrial IoT with TPM 2.0. This demonstration will show you how to use Mocana’s TrustPoint embedded cybersecurity software integrated with Infineon’s TPM technology to make devices tamper-resistant, improve electronic access controls, and secure IIoT communications and containerized applications.
Nir Tasher of Winbond will talk to attendees about the implementation of a lightweight root of trust into secure flash and how that can be designed into embedded and IOT systems for added security and protection against malware and attacks.
By allowing Trusted Computing Group (TCG) to scan your badge and/or by dropping your business card at the TCG booth, you are consenting to allow TCG and present partners (Mocana, OnBoard Security, Wibu-Systems, and Winbond) to collect your personal information to be used for marketing communications, including: relevant promotions, invitation to read relevant content including specifications and reference documents, newsletters and event announcements relating to trusted computing trends, and best practices in the data security industry.