Now that it’s a few weeks in the rearview mirror, we can start to think about all we saw and heard at RSA.
At its Monday Association Session, more than 650 attendees packed the TCG room to hear about endpoint compliance and security automation – very hot topics as IT and security teams figure out how to do more – much more – with stretched resources and a bewildering number of tools, so-called solutions and product pitches.
During the panel, ESG analyst Jon Oltsik riffed on one of his long-time themes of standardizing security when it makes sense and streamlining processes for better effectiveness and efficiency.
NIST SCAP expert David Waltermire talked about ongoing efforts to drive standards that support TCG’s TNC and integrate the security content automation protocol currently in use and evolving. Stephen Whitlock of Boeing addressed his company’s role and interest in standards and how large manufacturing companies and others will benefit from new ways to ensure routine and continual security updates and protection, while Dan Griffin of JWSecure addressed the industry and vendor efforts to support existing and emerging standards.
The complete video is available here: RSA Conference 2014: Get Proactive with Security
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.