BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Trusted Computing Group - ECPv6.3.4//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Trusted Computing Group X-ORIGINAL-URL:https://trustedcomputinggroup.org X-WR-CALDESC:Events for Trusted Computing Group REFRESH-INTERVAL;VALUE=DURATION:PT1H X-Robots-Tag:noindex X-PUBLISHED-TTL:PT1H BEGIN:VTIMEZONE TZID:America/Denver BEGIN:DAYLIGHT TZOFFSETFROM:-0700 TZOFFSETTO:-0600 TZNAME:MDT DTSTART:20180311T090000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0600 TZOFFSETTO:-0700 TZNAME:MST DTSTART:20181104T080000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;VALUE=DATE:20180627 DTEND;VALUE=DATE:20180629 DTSTAMP:20240328T193738 CREATED:20180219T203731Z LAST-MODIFIED:20180628T223433Z UID:55027-1530057600-1530230399@trustedcomputinggroup.org SUMMARY:Sensors Expo 2018 DESCRIPTION:Sensors Expo Workshop: Securing the IoT and Embedded Systems with TCG and Embedded Computing Design\n \n  \n  \nThursday\, June 28\, 2018\n1:00pm – 4:30pm PT\nExecutive Ballroom E\nBooth #1539 \nFree Expo Hall Pass and $100 Registration with TCG code TCG100. \n \n  \nClick here to download the presentation. \n  \nEmbedded and IoT systems and networks remain highly vulnerable to attacks\, whether malicious or accidental. These attacks result in lost personal and corporate data\, legal fines\, lost customer trust and lost services – or they can also simply shut down critical infrastructure\, from oil and gas pipelines to manufacturing to the financial system. Despite the obvious security concerns\, manufacturers worldwide continue churning out unprotected\, connected things based on networks that were not intended to handle the security\, traffic or things suddenly tied together. What can be done? \nWith Embedded Computing Design\, Trusted Computing Group (TCG) will offer a session Thurs.\, June 28th\, from 1:00- 4:30pm PT\, in Executive Ballroom E to discuss and demonstrate real-world solutions and technologies\, based on widely vetted and adopted standards\, to secure embedded and IoT systems\, networks and data. The session will address the role and implementation of a root of trust\, the development of secure software to support a root of trust and how we can embed trust and security into networks. Experts also will demonstrate examples of these technologies and talk about resources and tools to implement them. \n  \nWorkshop Speakers:\n1:00 – 1:10: Brandon Lewis\, Embedded Computing Design – Welcome\, agenda\n1:10 – 1:45: IoT\, Trust\, and Security (Josef Kohn\, Infineon)\n1:45 – 2:20: TPM Turtorial and TSS Overview (Lee Wilson\, OnBoard Security)\n2:20 – 2:40: Break/member demonstrations\n2:40 – 3:15: DICE Tutorial (Dennis Mattoon\, Microsoft)\n3:15 -3:55: Panel Discussion\n3:55 – 4:30: Q&A/Networking and Demos \n  \nBrandon Lewis\, Technology Editor\, Embedded Computing Design\, with a focus on IoT Design\, Industrial AI & Machine Learning\, and Automotive Embedded Systems and IoT Insider columnist\nJosef Kohn\, Regional Marketing Manager\, Infineon\nDennis Mattoon\, Principal Software Development Engineer\, Microsoft\nLee Wilson\, Product Development Engineer\, Onboard Security \n  \nTCG members also will demonstrate the lightweight root of trust\, TPM and other security solutions in Booth #1539 during exhibit hours. URL:https://trustedcomputinggroup.org/press-rooms/events/iot-university-sensors-expo-2018/ CATEGORIES:All Events ATTACH;FMTTYPE=image/jpeg:https://trustedcomputinggroup.org/wp-content/uploads/abstract-header_03.jpg END:VEVENT END:VCALENDAR