Save the Date: RSA Conference 2015 to Host TCG Session with Look at IoT and Other Critical Security Issues

Date Published: January, 13, 2015

With the holidays in the rear view mirror, those of us in the security community are looking ahead to RSA Conference 2015 April 20-24.

TCG will once again give attendees a great reason to wake up early Monday and head to Moscone West before the floor opens on Tuesday: April 20, 9 a.m. – 1 p.m.,  experts will gather in Rooms 2002/2006 to discuss some of the biggest issues in security today.

Speakers and panels will look at trust and security in the Internet of Things. With everything from wearables to cars to industrial devices connected, whether we can trust this emerging IoT is a key, if not THE, key issue.

Attendees will hear from Darin Anderson, president and CEO of CyberUnited and and CyberHive and his work in the Internet of Things, looming security challenges and potential fixes. Before CyberUnited and CyberHive, Anderson was general manager, North America for Norman AS which offers content security solutions and forensics malware tools. He also served as the COO of ESET, an international software security company. Andersen received two Masters Degrees from the USC Marshall School of Business: a MBA in Finance and Operations Management and MS in Information Technology and Operations Management.

TCG members are working on dozens of new demos that will address not only the IoT but other troublesome security issues including data protection, authentication and network security.

Anderson will be joined by a number of other well-known experts; watch for details and register here now:http://www.rsaconference.com/events/us15/register?utm_source=tcg&utm_medium=display&utm_content=registration&utm_campaign=banner-656×300-us2015

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More