Security Industry Analysts and Experts to Headline Trusted Computing Group RSA Conference 2014 Session

Date Published: January, 01, 2014

Jon Oltsik, Victor Wheatman, Paul Roberts and Gal Shpantzer Join Panelists from DMI, Intel, Juniper Networks, JWSecure, Microsoft, Mobile Active Defense, NIST and Boeing for Sessions on Security Automation, TPM and Mobile Security

PORTLAND, Ore., Feb. 7, 2014– Experts from around the security community will tackle issues and challenges for endpoint compliance and security automation, the TPM, and mobile security in an association session at the RSA Conference 2014, hosted by Trusted Computing Group.

The session is Mon., Feb. 24, 10 a.m. – 2 p.m. in Room 2018 at Moscone Center West (second floor). RSA attendees with the Expo or conference pass can attend; registration is open at

Joerg Borchert, TCG president, will greet attendees with opening remarks, followed by a panel at 10:15 a.m., “Endpoint Compliance and Security Automation.” Jon Oltsik, ESG, will moderate with panelists Steve Whitlock, chief security architect, The Boeing Company; Dan Griffin, founder, JWSecure; and Dave Waltermire, NIST security automation architect.
“Will the Real TPM Please Stand Up” will follow, moderated by Paul Roberts, founder and publisher, Intel Security Architect Monty Wiseman and security consultant and SANS author Gal Shpantzer will join Roberts in discussion of new features of the TPM and its role in the increasingly connected Internet of Things, along with Dustin Ingalls, Windows Security, Microsoft.
A final session, “Mobile Device Security: Fact or Fiction”, will look at the issues around BYOD and mobile security and the role of trust. DMI CISO Rick Doten and Eric Green, vice president of sales, Mobile Active Defense, will join moderator Victor Wheatman, independent security analyst. Jason Conyard, Juniper networks vice president, information technology, will talk about how Juniper handles BYOD and security.
A demonstration showcase will run between the sessions.

Get more information here,
More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website,

— 30 —
Brands and trademarks are the property of their respective owners.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More