RSA Conference 2011

Date Published: January, 01, 2015

RSA Conference 2011
February 14, 2011 – February 18, 2011

San Francisco, CA

RSA Banner

TCG Activities at RSA Conference 2011:

Monday Association Seminar

When: Monday, February 14, 2010 11:00AM – 3:00PM
Where: Esplanade Room 301 – 303, Moscone Center South

Can You Trust Your Enterprise?

Top Analysts & Implementers Debate Using Trusted Computing

Seminar Description:
Trusted Computing now plays a key role in national security for not only the United States but for the United Kingdom and other nations. What, then, is the role of the trusted platform in the enterprise? This half-day workshop will offer provocative discussion about the role of trust, hardware-based security and why it’s finally reached the tipping point. Enterprise customers who have deployed trusted computing for authentication, data protection and network security alongside distinguished moderators Derek Brink, Aberdeen Research; Roger Kay, Endpoint Technologies; and Eric Ogren, Ogren Group will be featured. Industry experts will question users about their experiences. Attendees can also see the latest technologies in action. Lunch will be provided.

Seminar Schedule:

11:00AM – 11:10AM
Welcome and Introduction
Steve Hanna, TNC Co-Chair and Distinguished Engineer, Juniper Networks (Download Presentation)
11:10AM – 11:40AM Keynote – Leveraging TPM for Low Cost, Strong Authentication at PwC
Karl Wagner, Director of Global Networking, PwC (Download Presentation)
11:40AM – 12:10PM Lunch and Demonstration Showcase
12:10PM – 12:50PM
Deployment Models for Your Future Network Security Solutions
Moderator: Eric Ogren, Founder and Principal Analyst, Ogren Group (Download Presentation)
Paul Bartock, Technical Director for Information Assurance Transformation, Vulnerability Analysis and Operation Group, US National Security Agency (Download Presentation)
Michael Lindskov, Senior Manager and Enterprise Architect, CUNA Mutual Group
David O’Berry, Director of IT Systems and Services, South Carolina, Department of Probation, Parole, and Pardon Services
12:50PM – 1:05PM
Demonstration Showcase Break
1:05PM – 1:45 PM
Eliminating Risk and Reducing Costs with TPM
Moderator: Roger Kay, Founder, Endpoint Technologies
Brian Berger, EVP Marketing & Sales, Wave Systems Corp.
Boudewijn Kiljan, Solution Architect, PwC
Jeremy Wyant, High Assurance Systems Engineer, General Dynamics (Download Presentation)
1:45PM – 2:00PM Demonstration Showcase Break
2:00PM – 2:40PM Faster, Lower Costs and High Assurance – The Role of Encrypted Hard Drives
Moderator: Derek Brink, CISSP, Vice President and Research Fellow, Aberdeen Group (Download Presentation)
David Bowers, Manage, LE Client Technologists, Dell
Jeff Kam, InformationTechnology Asset Manager, Dendreon Corporation (Download Presentation)
Stan Potter, Emerging Technologies Lead, NCSC Trusted Computing Division, US National Security Agency
2:40PM – 3:00PM Demonstration Showcase & Networking Break
3:00PM Closing Remarks

Trusted Computing Demonstration Showcase Provided By:

Network Security Solutions

Byres Security
Juniper Networks – Booth #1745
Lumeta Corporation
Authentication Solutions
General Dynamics
Wave Systems Corp. – Booth #939
Data Protection Solutions
Absolute Software
ULINK Technology
Wave Systems Corp. – Booth #939
WinMagic Ltd. – Booth #839
Return to events listing


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More