RSA Conference 2012

Date Published: January, 01, 2015

RSA Conference 2012

February 27, 2012 – March 2, 2012

San Francisco, California

RSA USA 2012
February 27 – March 2
Moscone Center
San Francisco 

Monday Association Seminar

When: Monday, February 27, 2012 | 10:00am – 2:00pm

Where: Esplande Room 301 – 303, Moscone Center South

The Paradox of Security: Is the Status Quo Acceptable?

Description: The market of security is in a state of misshapen chaos. In a world where users sign end-user license agreements that give away their personal identity and will buy a “cool” device that limits user choice on what they can do with that device, TCG and its members provide industry accepted security solutions to any platform. Learn how to use a hardware root of trust as an anchor for data leak and malware prevention; platform integrity; device and user identity; and network access.

Twitter Traffic about TCG at RSA Conference 2012   

Seminar Agenda

10:00am – 11:00am | Can Self-Encrypting Drives Meet Compliance Requirements and Ensure Data Protection? Real-world Experts  Talk SED Deployments
Self-Encrypting Drives – Michael Willett, Samsung  Download Presentation
One Size Fits All: Opal, One Solution for All OS – Thi Nguyen-Huu, WinMagic  Download Presentation
Self-Encrypting Drive Enterprise Deployments: End-Users Discuss SEDs in Action  Download Presentation
  • Hussein Syed, Barnabas Health
  • Mark Mulvaney, Boston Medical Center
  • Dean Notarnicola, Daiichi Sankyo Inc.
  • Rob MacBride, United Network for Organ Sharing
11:00am – 11:15am | Break – Demo Showcase                                                                                                                                
11:15am – 12:15pm | Securing Mission-Critical Networks and Automating Security in Enterprise Environments
A Vision for Security Automation – Paul Bartock and Chris Salter, NSA Download Presentation
If You Could Automate Security, Why Wouldn’t You? – David Lennon, Lumeta Corporation Download Presentation
Evolving Mission Demands Agile Network Security – James Clifford, Los Alamos National Laboratory Download Presentation
Bring Your Own Device – Steve Hanna, Juniper Networks Download Presentation
 12:15pm – 12:45pm | Lunch – Demo Showcase
12:45pm – 1:15pm | Extending Trust to the Cloud and Deploying the TPM for Multi-tenant Security
Building Trust and Compliance in the Cloud – Steve Orrin, Intel Corporation Donwload Presentation
Trusted Computing: Bring Contol and Visibility to the Cloud Donwload Presentation
  • James Greene, Intel Coporation
  • Robert Rounsavall, Trapezoid
 TCG Technologies for Cloud and Virtualized Data Centers – Shawn Mullen, IBM Donwload Presentation
1:15pm – 1:30pm | Break – Demo Showcase

 

1:30pm – 2:00pm | Making Mobile Devices Trusted
Trusted Computing Based Insider Threat Protection and Assured Information Sharing – Leslie Andresen, GDC4S Download Presentation
MTM 2.0 Built on System on Chip – Nicolas Ponsini,Trusted Logic Mobilty Download Presentation
Demonstrations Provided By:
Network Security Boeing Company, HSR, Juniper Microsfot Download Demonstration Description
Hirsch, Identive, Enterasys Secure Networks Download Demonstration Description
Infoblox, Juniper, Lumeta Download Demonstration Description
Data Protection Samsung Download Demonstration Description
Seagate Download Demonstration Description
WinMagic Download Demonstration Description
Cloud Security Intel, Trapezoid Download Demonstration Description
Mobile Security Wave Systems Download Demonstration Description

 

 

Return to events listing

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More