Securing the IoT with Trusted Computing Half-day Seminar and Demonstration Showcase
When: Monday, February 29, 2016 8:30am – 12:30pm
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Resources Available for Download:
PRESS surrounding TCG’s IoT Panels and Demonstrations:
The free session included three thought-provoking panels and 20+ demonstrations of trust and standards in the enterprise and the IoT.
Keynote speaker Doug Cahill, Senior Analyst, ESG, discussed recent findings on security, networks and the cloud. IoT security expert Darin Andersen, chairman and founder of CyberTECH, led a panel on vulnerabilities in the IoT and how trust might support better security. Lee Wilson of Security Innovations and Max Senges of Google joined Andersen.
A second panel, moderated by Paul Roberts, founder and editor-in-chief, Security Ledger,
looked at the newest and best ways to implement the TPM. He was joined by Paul England, Software Architect, Microsoft Corporation and examined new tools in Windows 10 and by Matthew Garrett, Principal Security Software Engineer, CoreOS.
The third panel moderated by Derek Harp, Director for ICS Global Programs at SANS, focused on securing the connection and included Steve Venema, senior architect of Polyverse Corporation, and Tony Sager, Senior Vice-President and Chief Evangelist, Center for Internet Security. The group looked at the issues related to connecting IoT devices and
securing legacy and new network connections.
Monty Wiseman, Intel Corporation, hosted an “ask the expert” on the #TPM, associated software and how to implement it.
TCG offered a limited number of the new book ,“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”,
from Apress and TCG members from IBM, Intel and Johns Hopkins University Applied Physics Laboratory were at the event.
Follow TCG on Twitter!
|8:30 AM||Welcome/Introduction to Session |
Demos open in adjacent room
|Mark Schiller, TCG Executive Director|
|8:40-9:15 AM||Keynote: Trust-Based Security for Multi-Dimensional Clouds||Doug Cahill, Senior Analyst for Cybersecurity, Enterprise Strategy Group (ESG)|
|9:15-10:00 AM||Panel 1: IoT, Trust and Security||Moderator: Darin Andersen, CEO and President, CyberTrust
Panelists: Lee Wilson, Product Development Engineer, Security InnovationMax Senges, Product Manager, Google
|10:00-10:10 AM||Update from TCG and Demo Highlights||Mark Schiller, TCG Executive Director|
|10:10-10:55 AM||Panel 2: Things to Do with the TPM||Moderator: Paul Roberts, Editor and Chief, Security Ledger
Panelists: Paul England, Software Architect, Microsoft CorporationMatthew Garrett, Principal Security Software Engineer, Core OS
|11:05-11:50 AM||Panel 3: Network Security in the IoT||Moderator: Derek Harp,Director ICS Global Programs, SANS
Panelists: Steve Venema, Senior Security Architect, PolyverseTony Sager, Senior VP and Chief Evangelist, Center for Internet Security
|11:50-12:00 PM||End of Seminar - Live Raffle Drawing for Prizes|
|12:00-12:30 PM||Demonstration Showcase|
|Think Outside the Box - Secure Your TLS!!|
|NAC and Endpoint Defense for a Mobile Workforce|
|Securing IoT with Trusted Computing|
|Data Loss Prevention in Mixed Environments – Windows, Mac and Linux|
|Enabling Mission-Critical IoT Applications with a Dell Edge Gateway|
|Open Source Management Software for SEDs|
|Advanced Firmware Upgrade Schemes Using TPM 2.0 Enhanced Authorization Policies|
|Secure Remote Maintenance for ECUs in a Car Using TPM|
|Huawei and Infineon Secure the IoT with TPM|
|IP Protection and Flexible Licensing Applied to TPM Connected Devices|
|Scalable Strong Device Identity through Provisioning and Operation|
|Remote Secure Erase|
|Trustworthy IoT Gateway|
|TPM 2.0 Family Enabling for Linux|
|Effective TPM 2.0 via Android and Representational State Transfer (RESTful) Architecture|
|Trusting IoT Devices Using Remote Device Attestation|
|JW Secure StrongNet Secure Admin|
|SEDs: From the Notebook to the Server|
|Enterprise Ready IoT Devices|
|Health Attestation for Windows Systems|
|Intelligent Endpoint Compliance|
|Simplify Secure Access|
|“Cloaking” is the New Perimeter|
|SEDs in the IoT|