Loading Events


Monday, February 25, 2013, GMT-0700
Event Category:
  • This event has passed.

Event Navigation

RSA 2013 – Trusted Computing: Billions of Secure Endpoints in 10 Years

Monday, February 25, 2013, GMT-0700

This page contains all the relevant materials for the Trusted Computing Group’s Association Monday Seminar at RSA Conference USA 2013.

Trusted Computing: Billions of Secured Endpoints in 10 Years
When: Monday, February 25, 2013 | 10:00am – 2:00pm
Where: Esplanade Room 301, Moscone Center South

Marking its 10th anniversary and the adoption of Trusted Computing technologies and specifications in more than a billion endpoints, Trusted Computing Group hosted its annual RSA Conference session.

Videos of RSA Conference Keynote and Panels:

Reference Materials:

Session Agenda:

Time Session
10:00AM Welcome and Opening Remarks – Brian Berger, Trusted Computing Group Director
10:05AM Keynote Session: Top 10 Priorities in IT Security for the County of Los Angeles and the Importance of Inudstry Standards
Robert Pittman, MPA, CISM, Chief Information Security Officer, County of Los Angeles
10:30AM Panel Session: Advanced Persistent Threats and NIST SP 800-147 and NIST SP 800-155
Moderator: Paul Roberts, Security Ledger, Panelists: Frank Molsberry, Dell, Stacy Cannady, DMI, Sunil Gottumukkala, Microsoft, Dave Waltermire, NIST
11:15AM Networking Break and Demonstration Showcase
11:30AM Panel Session: Network Security, Critical Infrastructure and BYOD
Moderator: Phil Schacter, Gartner
Panelists: Phyllis Lee, NSA, Steve Venema, The Boeing Company, Bob Thibadeau, Wave Systems Corp.
12:15PM Lunch and Demonstration Showcase
1:05PM Panel Session: Protecting Content from Unauthorized Access
Moderator: Eric Ogren, Ogren Group
Panelists:Michael Willett, Samsung, Hussein Syed, Barnabas Health, Clain Anderson, Lenovo
1:45PM Closing Remarks and Raffle Drawing
1:55PM Networking Break and Demonstration Showcase

Demonstration Showcase Participants:

Time Session
 Absolute Software  Securing Mobility
 Asgaurd Networks | Juniper Networks  Practical Network Segmentation for Manageable Industrial Control Systems Security
 Fraunhofer SIT  Security for Dynamic and Ad-Hoc Networks
 Lumeta | Juniper Networks | Infoblox  Plugging the Leaks: Security Automation
 Identive | Infoblox | Juniper  Physical/Access Control Integration through IF-MAP
 Microsoft | Juniper Networks | Infoblox  Data Protection in a BYOD World: Security Automation
 MITRE  Feasibility of High Security TPM Provisioning Processes in the Enterprise
 NCP  Automated Security for Remote Systems
 Nokia  Trusted Computing in Nokia Lumia
 Samsung  Solid-State Self-Encrypting Drives: Where is your data tonight?
 Wave  Leveraging the TPM to Provide Device-based Multifactor Authentication
 WinMagic  Managing OPAL-Compliant Drives in Windows 8 and UEFI with Secure Boot