San Francisco, California
When: Monday, February 27, 2012 | 10:00am – 2:00pm
Where: Esplande Room 301 – 303, Moscone Center South
Description: The market of security is in a state of misshapen chaos. In a world where users sign end-user license agreements that give away their personal identity and will buy a “cool” device that limits user choice on what they can do with that device, TCG and its members provide industry accepted security solutions to any platform. Learn how to use a hardware root of trust as an anchor for data leak and malware prevention; platform integrity; device and user identity; and network access.
10:00am – 11:00am | Can Self-Encrypting Drives Meet Compliance Requirements and Ensure Data Protection? Real-world Experts Talk SED Deployments | |
Self-Encrypting Drives – Michael Willett, Samsung | Download Presentation |
One Size Fits All: Opal, One Solution for All OS – Thi Nguyen-Huu, WinMagic | Download Presentation |
Self-Encrypting Drive Enterprise Deployments: End-Users Discuss SEDs in Action | Download Presentation |
|
|
|
|
|
|
|
11:00am – 11:15am | Break – Demo Showcase |
11:15am – 12:15pm | Securing Mission-Critical Networks and Automating Security in Enterprise Environments |
|
A Vision for Security Automation – Paul Bartock and Chris Salter, NSA | Download Presentation |
If You Could Automate Security, Why Wouldn’t You? – David Lennon, Lumeta Corporation | Download Presentation |
Evolving Mission Demands Agile Network Security – James Clifford, Los Alamos National Laboratory | Download Presentation |
Bring Your Own Device – Steve Hanna, Juniper Networks | Download Presentation |
12:15pm – 12:45pm | Lunch – Demo Showcase |
12:45pm – 1:15pm | Extending Trust to the Cloud and Deploying the TPM for Multi-tenant Security | |
Building Trust and Compliance in the Cloud – Steve Orrin, Intel Corporation | Donwload Presentation |
Trusted Computing: Bring Contol and Visibility to the Cloud | Donwload Presentation |
|
|
|
|
TCG Technologies for Cloud and Virtualized Data Centers – Shawn Mullen, IBM | Donwload Presentation |
1:15pm – 1:30pm | Break – Demo Showcase |
1:30pm – 2:00pm | Making Mobile Devices Trusted | |
Trusted Computing Based Insider Threat Protection and Assured Information Sharing – Leslie Andresen, GDC4S | Download Presentation |
MTM 2.0 Built on System on Chip – Nicolas Ponsini,Trusted Logic Mobilty | Download Presentation |
Demonstrations Provided By: | ||
Network Security | Boeing Company, HSR, Juniper Microsfot | Download Demonstration Description |
Hirsch, Identive, Enterasys Secure Networks | Download Demonstration Description | |
Infoblox, Juniper, Lumeta | Download Demonstration Description | |
Data Protection | Samsung | Download Demonstration Description |
Seagate | Download Demonstration Description | |
WinMagic | Download Demonstration Description |
|
Cloud Security | Intel, Trapezoid | Download Demonstration Description |
Mobile Security | Wave Systems | Download Demonstration Description |
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.