Loading Events

Details

Date:
Monday, April 20, 2015, UTC
  • This event has passed.

RSA Conference 2015

Monday, April 20, 2015, UTC

April 20, 2015 – April 24, 2015
Moscone Center, San Francisco, CA

RSAC 2015

TCG Seminar and Demonstration Showcase

When: Monday, April 20, 2015 9:00AM – 1:00PM
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Should We Trust Mobile Computing, IoT and the Cloud?  No, But There Are Solutions
Resources:

Please visit https://twitter.com/TrustedComputin for up-to-date tweets regarding RSA. Use #RSAC and #TPM

Session Schedule:

[fusion_text]

Topic Participants
Welcome and Introduction to the Trusted Computing Group (TCG) Dr. Joerg Borchert – President, Trusted Computing Group
20-Story Snow Castle: Why We Need a New Foundation for the Internet of Things Paul Roberts, Founder and Editor in Chief, Security Ledger
Panel: Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise Moderator: Paul Roberts, Security Ledger
Panelist:

  • Amy Nelson, Engineering Technologist, Security Software Technical Planner, Dell
  • David Bossio, Group Program Manager, OSG Enterprise and Security R&D, Microsoft
Panel: The Insecure Internet of Things and How to Secure It Moderator: Rich Nass, Executive Vice-President, Embedded-Computing.com, OpenSystems Media
Panelist:

  • Stacy Cannady, Engineer Technical Marketing Security & Trust Organization, Cisco Systems
  • Darin Andersen, Founder, CyberUnited
  • Chuck Benson, Assistant Director of IT, Facilities Service, University of Washington
Panel: Mobile is King, But Security Must Be a Priority Moderator: Jai Vijayan; Technology Editor/Writer
Panelists:

  • Gil Bernabeu, Technical Director, GlobalPlatform
  • Lee Neely, Senior Cyber Analyst, Lawrence Livermore National Laboratory (LLNL)
  • Jon Geater, Chief Technology Officer, Trustonic

Demonstration Showcase Participants:

[fusion_text]

Participant Topic
Absolute Software LogoSeagate Logo Endpoint Compliance with Self-Encrypting Drives (SEDs)
 Artec Logo Secure your Data with TPM
 Cisco LogoHSR LogInfineon logoIntel Logo Securing IoT with Trusted Computing
Cososys Logo Quitting the Gamble of Trusting Insiders with Corporate Data
 Decoit LogoHsH logo Near Real-Time Network Security with an IF-MAP-Based SIEM Approach
 Dell Logo Dell Data Protection | Host Crypto Accelerator (HCA) and TPM Integration
 Fraunhofer SIT Logo Establishing Trust with Embedded Actuators in the IoT
 Fujitsu Logo Remote Firmware Update for Vehicle ECU with a TPM
 Huawei Logo Trusted Computing in Network Device
 Integrity Security Services Logo Trusted Device Lifecycle Management for End-to-End Security
 Intel Logo Intel Security Critical Infrastructure Protection (CIP) – For Managed IoT Security
 Intel Logo TPM 2.0 Family Enabling for Linux
 Intel Logo Cloud Data Security Gateway
 JW Secure Logo JW Secure Strongnet Secure Admin
 Microsoft Logo Microsoft Windows Internet of Things – Trusted I/O
 Decoit LogoHsH LogoPulse Secure Logo BYOD Solutions Well in Hand: Standards-Based Mobile Security
 Pulse Secure LogoRebasoft logo Breach Containment: Standards-Based Security Automation for Coordinated Threat Control
 Swisscom LogoIntel Logo Using TCG Technologies in a Real World Cloud Setup
 Tempered Network LogoPulse Secure Logo Dynamic Overlay Protection for Industrial Control Systems
 Wave Logo Wave Virtual Smart Card 2.0: Two-Factor Authentication with TPM
 Wave LogoSamsung logo The Fast, Risk-free Way to Deploy SEDs: Wave Cloud
 Winmagic LogoMicron Logo SED Management with TPM Protection
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.