BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Trusted Computing Group - ECPv6.3.4//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Trusted Computing Group X-ORIGINAL-URL:https://trustedcomputinggroup.org X-WR-CALDESC:Events for Trusted Computing Group REFRESH-INTERVAL;VALUE=DURATION:PT1H X-Robots-Tag:noindex X-PUBLISHED-TTL:PT1H BEGIN:VTIMEZONE TZID:America/Denver BEGIN:DAYLIGHT TZOFFSETFROM:-0700 TZOFFSETTO:-0600 TZNAME:MDT DTSTART:20140309T090000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0600 TZOFFSETTO:-0700 TZNAME:MST DTSTART:20141102T080000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;VALUE=DATE:20140224 DTEND;VALUE=DATE:20140225 DTSTAMP:20240328T203547 CREATED:20180504T181158Z LAST-MODIFIED:20180504T181158Z UID:90740-1393200000-1393286399@trustedcomputinggroup.org SUMMARY:RSA Conference 2014: Get Proactive with Security DESCRIPTION:TCG hosted its annual workshop during RSA Conference 2014 on Monday\, February 24\, 2014 \nMonday Association Seminar:\nGet Proactive with Security: A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires \nResources Available for Download:\n\nProgram Guide: includes sessions schedule\, complete demonstration showcase descriptions\, speaker bios and headshots\nPress Release: includes session topics\, including moderators and panelists\nPress Release: Includes information on demonstration showcase and technologies in action by member companies\n\nSession Agenda:\n\n\n\n\nTitle\nSpeaker\nVideo\n\n\n\n\nWelcome and Introduction to the Trusted Computing Group (TCG)\nDr. Joerg Borchert – President\, Trusted Computing Group\n\n\n\nPanel: Endpoint Compliance and Security Automation\nModerator: Jon Oltsik – Senior Principal Analyst\, Enterprise Strategy Group (ESG)\nPanelists: Steve Whitlock – Chief Security Architect\, The Boeing CompanyDan Griffin – Founder\, JW Secure and Microsoft Enterprise Security MVPDave Waltermire – Security Automation Architect\, NIST\n\n\n\nPanel: Will the Real Trusted Platform Module (TPM)Please Stand Up?\nModerator: Paul Roberts – Editor in Chief and Founder\, The Security Ledger\nPanelists: Gal Shpantzer – Security Consultant and Analysts \, SANS\, Monty Wiseman – Security Researcher\, Intel Corporation\, Dustin Ingalls – Partner Group Program Manager\, Windows Security\, Microsoft\n\n\n\nPanel: Mobile Device Security: Fact or Fiction\nModerator: Victor Wheatman – Global Information Security Market Analyst and Enterprise Advisor\nPanelists: Eric Green – SVP\, Business Development\, Mobile Active Defense & Program Director\, SC World CongressRick Doten – Chief Information Security Officer\, DMI\, Inc.Jason Conyard – Information Technology Vice President – Juniper Networks\n\n\n\n\n\nDemonstration Showcase Participants:\n\n\n\n\nParticipants\nTitle\n\n\n\n\n\n\n\nEndpoint Compliance & Self-encrypting Drives\n\n\n\n\n\nPractical Network Segmentation for Industrial Control System Security\n\n\n\n\n\n\n\nMobile BYOD Security\n\n\n\n\n\nNear Real Time Network Security with Open Source Tools\n\n\n\n\n\nTPM Software Stack (TSS) System API\n\n\n\n\n\nData Protection in a BYOD World: Security Automation\n\n\n\n\n\nSolid-State Drives with Self-encryption: Solidly Secure\n\n\n\n\n\nEndorsement Credentials for TPM Mobile\n\n\n\n\n\nEnhanced Embedded System Security Solutions Using TPMs\n\n\n\n\n\nUser and Device Identity Solutions: Virtual Smart Cards\n\n\n\n\n\nSED Management with HP Drive Encryption\n\n\n\n\n\nSecurity Automation Made Easy with Enterprise Drives URL:https://trustedcomputinggroup.org/press-rooms/events/rsa-conference-2014-get-proactive-with-security/ CATEGORIES:All Events END:VEVENT END:VCALENDAR