RSA Conference 2010

Date Published: January, 01, 2015

RSA Conference 2010

March 1, 2010 – March 5, 2010

Moscone Center in San Francisco, California

51D8EAC1-1D09-3519-AD0BA4B0DDD4E429 (1)
The Trusted Computing Group hosted a seminar, entitled, “Come Participate in the Industry’s First International Security Playground!” on Monday, March 1 from 11:00am to 3:00pm at the Moscone Center South Orange Room 304. Many joined fellow security practitioners, cryptographers and experienced network security administrators in the industry’s first hands-on international security playground. At this open event, attendees configured NAC appliances to integrate with other security systems, played around with cost saving authentication solutions, and experienced state of the art self-encrypting drives.

Demonstration Overview: TNC Everywhere: Pervasive Computing

Demonstration Overview: Data Protection for a Mobile World

TCG’s Security Playground featured the following presentations

Speaker Presentation: Commercially Proven Trusted Computing Solutions

Aidan Herbert, Wave Systems Corp.

 

Speaker Presentation: Trust: When Physical and Logical Security Worlds Collide

Bob Beliles, Vice President of Enterprise Business Development, Hirsch Electronics

Bob Beliles is Vice President of Enterprise Business Development for Hirsch Electronics, a leading manufacturer of IP-based high security access control and identity management systems. Prior to joining Hirsch, Mr. Beliles co-founded and subsequently lead the marketing efforts for Cisco System’s physical security initiative, including the acquisition and integration of two video surveillance systems vendors. Bob has authored several patents (pending) on the subject of building system convergence on an IP infrastructure, including physical security systems. During his 11 years with Cisco, he also led product teams for Cisco’s flagship network switch and was responsible for some of Cisco’s first and widely deployed VoIP-capable products. Additionally, he has 11 years of systems engineering and sales experience with Advanced Micro Devices, Hewlett Packard and Philips Information Systems. He is frequently quoted in the industry press and is an accomplished security industry speaker. Mr. Beliles holds a Bachelor of Science degree in Computer Engineering from Clemson University.

 

Speaker Presentation: A New MAP of the World

Stu Bailey, Founder and CTO, Infoblox

Richard Kagan directs all marketing programs at Infoblox, including channel and product marketing, positioning and brand development, industry analyst and public relations, communications, and strategic alliance initiatives. He has over 24 years experience in the telecommunications, networking, and security industries. Richard joined Infoblox from Fortinet where, as vice president of marketing, he built and led the team that defined and introduced a new category of integrated security appliances that represents the fastest growing segment of the network security market. Prior to Fortinet, he served as the founding vice president of marketing for VPNet, the first provider of ASIC-based VPN gateways, which was purchased by Avaya. Richard also has held engineering and marketing roles at Echelon, ROLM, and Bell Laboratories. He earned a B..S in electrical engineering from the University of Michigan, Ann Arbor and an M.S. in electrical engineering from the University of California, Berkeley. Richard has been published in numerous technical and business publications and is co-inventor on three patents in networking. For more information, please visithttp://www.infoblox.com/company/leadership.cfm#kagan#ixzz0cWNzWfqa.

 

Speaker Presentation: Coordinated Security: A New Paradigm

Steve Hanna, Distinguished Engineer, Juniper Networks

Steve Hanna is a Distinguished Engineer at Juniper Networks. He is co-chair of the Trusted Network Connect Work Group in the Trusted Computing Group, and co-chair of the Network Endpoint Assessment Working Group in the Internet Engineering Task Force. Steve is active in other networking and security standards groups such as the Open Group and OASIS. He is the author of several IETF RFCs and published papers, an inventor or co-inventor on 33 issued U.S. patents, and a regular speaker at industry events. He holds an A.B. in Computer Science from Harvard University.

 

Speaker Presentation: Making TNC Work For You

Lisa Lorenzin, Principal Solutions Architect, Juniper Networks

Lisa Lorenzin is a Principal Solutions Architect with Juniper Networks, specializing in security solutions, and a contributing member of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles for the past 15 years, with more than a decade of that focused on network and information security, and is currently concentrating on NAC deployment and critical infrastructure protection.

 

Speaker Presentation: I Trusted You Once, But Can I Still? Post-Admission TNC

Matt Webster, Director of Technical Alliances, Lumeta

Matt Webster has over 20 years experience in the networking and security industries. Webster has held a number of different roles since joining Lumeta in 2004; including Managing Consultant,
and Director of Sales Engineering. Currently, as the Director
of Technology Alliances, Webster is focused on building technology partnerships that enable organizations to realize the benefits of product collaboration and interoperability. He is an active participant in the Trusted Computing Group and co-chairs the Trusted Network Connect Adoption Sub-Group.

 

Speaker Presentation: Introduction to Trusted Computing Benefits and Solutions

Brian Berger, Executive Vice President of Marketing & Sales, Wave Systems Corp

Brian Berger is an Executive Vice President for Wave Systems Corp. He manages the business, strategy and marketing functions that include product management, product positioning, marketing and sales direction for the company. Berger holds a key executive leadership position for the company to develop and implement the strategy for Trusted Computing. Berger has been involved in security products for the past 10 years including work with embedded hardware, client / server applications, PKI and biometrics. Berger holds three patents and has pending patents for security products and commerce transactions capabilities using security technology. He holds a BA degree from California State University, Northridge and attended Harvard Business School, Executive Education.

 TCG participants for this event:

For more information, please visit http://www.rsaconference.com/2010/usa/index.htm.

Return to events listing

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More