Recap: RSA Conference 2016

Date Published: March, 01, 2016

Recap: RSA Conference 2016

For the 12th year, Trusted Computing Group hosted a session at RSA here in the U.S. What used to be a dead day, Monday, is now packed with association sessions, the Innovation Sandbox and training. Fortunately, more than 1,100 attendees found time to spend the first half of the day with us to hear more about securing the IoT and the role of trust and industry specifications in doing so.

Why the crush? While we didn’t have a long line to get into the session this year (yay), we filled very seat – likely due to the terrific keynote by Doug Cahill, ESG (check out his and his colleague’s post-RSA recap here) and three great panels that covered issues around ICS and traditional network security, using the TPM, and challenges in IoT security. With participants from CyberTech, Google, CoreOS, Microsoft, Center for Internet Security, Security Ledger, SANS Institute and more, we had plenty of lively conversation and lots of great questions. Attendees also heard about TCG’s increasing focus on IoT security from our executive director, Mark Schiller.

What you really missed were the demos, most of them new and many demonstrating how to use existing technologies for various IoT and enterprise security applications. From autos to building security and automation to ATMs, TCG members put together some excellent working examples that show how to provide strong trust and security for not only devices of various types but for data and networks.

A complete guide to demos can be found here,

TCG thanks our members, media partners Embedded Computing Design and Security Ledger and our many speakers and panelists for making this another worthwhile event.



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More