Securing the IoT with Trusted Computing Half-day Seminar and Demonstration Showcase
When: Monday, February 29, 2016 8:30am – 12:30pm
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Resources Available for Download:
PRESS surrounding TCG’s IoT Panels and Demonstrations:
The free session included three thought-provoking panels and 20+ demonstrations of trust and standards in the enterprise and the IoT.
Keynote speaker Doug Cahill, Senior Analyst, ESG, discussed recent findings on security, networks and the cloud. IoT security expert Darin Andersen, chairman and founder of CyberTECH, led a panel on vulnerabilities in the IoT and how trust might support better security. Lee Wilson of Security Innovations and Max Senges of Google joined Andersen.
A second panel, moderated by Paul Roberts, founder and editor-in-chief, Security Ledger,
looked at the newest and best ways to implement the TPM. He was joined by Paul England, Software Architect, Microsoft Corporation and examined new tools in Windows 10 and by Matthew Garrett, Principal Security Software Engineer, CoreOS.
The third panel moderated by Derek Harp, Director for ICS Global Programs at SANS, focused on securing the connection and included Steve Venema, senior architect of Polyverse Corporation, and Tony Sager, Senior Vice-President and Chief Evangelist, Center for Internet Security. The group looked at the issues related to connecting IoT devices and
securing legacy and new network connections.
Monty Wiseman, Intel Corporation, hosted an “ask the expert” on the #TPM, associated software and how to implement it.
TCG offered a limited number of the new book ,“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”,
from Apress and TCG members from IBM, Intel and Johns Hopkins University Applied Physics Laboratory were at the event.
Follow TCG on Twitter!
|8:30 AM||Welcome/Introduction to SessionDemos open in adjacent room||Mark Schiller, TCG Executive Director|
|8:40-9:15 AM||Keynote: Trust-Based Security for Multi-Dimensional Clouds||Doug Cahill, Senior Analyst for Cybersecurity, Enterprise Strategy Group (ESG)|
|9:15-10:00 AM||Panel 1: IoT, Trust and Security||Moderator: Darin Andersen, CEO and President, CyberTrust
Panelists: Lee Wilson, Product Development Engineer, Security Innovation, Max Senges, Product Manager, Google
|10:00-10:10 AM||Update from TCG and Demo Highlights||Mark Schiller, TCG Executive Director|
|10:10-10:55 AM||Panel 2: Things to Do with the TPM||Moderator: Paul Roberts, Editor and Chief, Security Ledger
Panelists: Paul England, Software Architect, Microsoft Corporation, Matthew Garrett, Principal Security Software Engineer, Core OS
|11:05-11:50 AM||Panel 3: Network Security in the IoT||Moderator: Derek Harp,Director ICS Global Programs, SANS
Panelists: Steve Venema, Senior Security Architect, Polyverse, Tony Sager, Senior VP and Chief Evangelist, Center for Internet Security
|11:50-12:00 PM||End of Seminar – Live Raffle Drawing for Prizes|
|12:00-12:30 PM||Demonstration Showcase|
Demonstration Showcase Participants:
|Think Outside the Box – Secure Your TLS!!|
|NAC and Endpoint Defense for a Mobile Workforce|
|Securing IoT with Trusted Computing|
|Data Loss Prevention in Mixed Environments – Windows, Mac and Linux|
|Enabling Mission-Critical IoT Applications with a Dell Edge Gateway|
|Open Source Management Software for SEDs|
|Advanced Firmware Upgrade Schemes Using TPM 2.0 Enhanced Authorization Policies|
|Secure Remote Maintenance for ECUs in a Car Using TPM|
|Huawei and Infineon Secure the IoT with TPM|
|IP Protection and Flexible Licensing Applied to TPM Connected Devices|
|Scalable Strong Device Identity through Provisioning and Operation|
|Remote Secure Erase|
|Trustworthy IoT Gateway|
|TPM 2.0 Family Enabling for Linux|
|Effective TPM 2.0 via Android and Representational State Transfer (RESTful) Architecture|
|Trusting IoT Devices Using Remote Device Attestation|
|JW Secure StrongNet Secure Admin|
|SEDs: From the Notebook to the Server|
|Enterprise Ready IoT Devices|
|Health Attestation for Windows Systems|
|Intelligent Endpoint Compliance|
|Simplify Secure Access|
|“Cloaking” is the New Perimeter|
|SEDs in the IoT|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.