RSA Conference 2014: Get Proactive with Security

TCG hosted its annual workshop during RSA Conference 2014 on Monday, February 24, 2014

Monday Association Seminar:

Get Proactive with Security: A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires

Resources Available for Download:

  • Program Guide: includes sessions schedule, complete demonstration showcase descriptions, speaker bios and headshots
  • Press Release: includes session topics, including moderators and panelists
  • Press Release: Includes information on demonstration showcase and technologies in action by member companies

Session Agenda:

Title Speaker Video
Welcome and Introduction to the Trusted Computing Group (TCG) Dr. Joerg Borchert – President, Trusted Computing Group
Panel: Endpoint Compliance and Security Automation Moderator: Jon Oltsik – Senior Principal Analyst, Enterprise Strategy Group (ESG)
Panelists: Steve Whitlock – Chief Security Architect, The Boeing CompanyDan Griffin – Founder, JW Secure and Microsoft Enterprise Security MVPDave Waltermire – Security Automation Architect, NIST
Panel: Will the Real Trusted Platform Module (TPM)Please Stand Up? Moderator: Paul Roberts – Editor in Chief and Founder, The Security Ledger
Panelists: Gal Shpantzer – Security Consultant and Analysts , SANS, Monty Wiseman – Security Researcher, Intel Corporation, Dustin Ingalls – Partner Group Program Manager, Windows Security, Microsoft
Panel: Mobile Device Security: Fact or Fiction Moderator: Victor Wheatman – Global Information Security Market Analyst and Enterprise Advisor
Panelists: Eric Green – SVP, Business Development, Mobile Active Defense & Program Director, SC World CongressRick Doten – Chief Information Security Officer, DMI, Inc.Jason Conyard – Information Technology Vice President – Juniper Networks

Demonstration Showcase Participants:

Participants Title
absolute software corporation Seagate Technology Endpoint Compliance & Self-encrypting Drives
Asguard Networks Juniper Networks, Inc. Practical Network Segmentation for Industrial Control System Security
DMI
Mobile BYOD Security
Trust at HSH DECOIT GmbH HSR Near Real Time Network Security with Open Source Tools
Intel Corporation TPM Software Stack (TSS) System API
Juniper Networks, Inc. microsoft JW Secure, Inc. Data Protection in a BYOD World: Security Automation
Samsung Semiconductor, Inc. wave Solid-State Drives with Self-encryption: Solidly Secure
trusttonic Endorsement Credentials for TPM Mobile
Infineon Technologies AG Enhanced Embedded System Security Solutions Using TPMs
wave User and Device Identity Solutions: Virtual Smart Cards
WinMagic, Inc. Intel Corporation HP Inc. SED Management with HP Drive Encryption
WinMagic, Inc. Seagate Technology Security Automation Made Easy with Enterprise Drives