Loading Events


Friday, September 9, 2016, GMT-0700
9:00 AM - 5:00 PM
Event Category:


Peggy Smedley Institute


Marriott San Diego Del Mar
11966 El Camino Real
Del Mar, CA 92130 United States
+ Google Map
  • This event has passed.

Peggy Smedley Institute

Friday, September 9, 2016, GMT-0700 @ 9:00 AM - 5:00 PM UTC-7

Join TCG Member Stacy Cannady of Cisco Systems at the Peggy Smedley Institute September 9th in San Diego, CA for two sessions on trust in the IoT.

Marriott San Diego Del Mar
September 9, 2016 9:00am – 4:10pm
11966 El Camino Real
Del Mar, CA. 92130

10:00 a.m. – 10:30 a.m. Trust in IoT Manufacturing
Stacy Cannady, CISSP and technical marketing for Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development), Cisco Systems

What is a trusted manufacturing process? What is the business value of a trusted manufacturing process to the OEM (original-equipment manufacturer) and to the customer? Why would an OEM invest in such a thing? What is the expected ROI? Trusted manufacturing begins with a secure development lifecycle, and continues with manufacturing controls designed to provide evidence that the products built match the approved design. This evidence can later be used to prove whether a product in the hands of the customer is genuine and whether it has been modified by a third party. The payoff is lower costs of design, lower costs in manufacturing, lower costs of counterfeiting, brand protection, and brand enhancement. We will discuss the principles of trust the standards-body Trusted Computing Group lays out in its specifications and how these apply as an example in the case of Cisco in this primarily business-focused session.

2:35 p.m. – 3:00 p.m. Cisco: Trust in the IoT Supply Chain
Stacy Cannady, CISSP and technical marketing for Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development), Cisco Systems

The Trusted Computing Group develops specifications focused on aspects of trust in the supply chain. The reason is that if security is important to your customers, they will ask for evidence that products they attach to their networks are genuine and that they have not been modified by a third-party before they were delivered to the customer’s dock. As an OEM (original-equipment manufacturer), Cisco buys components from many parts manufacturers. Cisco supports a distribution chain to deliver its products into the hands of our customers. Cisco is also a priority target for compromise of our supply chain. The reasons are counterfeiting and espionage. Cisco’s experience and response to supply-chain trust and security is probably more than is necessary for most IoT-OEMs. Even so, Cisco sees a positive ROI in business results and Brand protection and enhancement through securing its supply chain. This discussion will describe the business goals and some of the requirements for creating a trusted and secure supply chain, plus sources of ROI for this activity.


For more information and register, please visit http://learnitiot.com/instituteagenda-current/.

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.