Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando

Date Published: November, 30, 2017

Steve Hanna, Infineon and co-chair or chair of TCG’s embedded systems, IoT and Industrial Work Groups, will speak at the IoT Evolution Expo ( on Wednesday, January 24, 2018, at 3:00 p.m. – 3:55 p.m. ET in a session Avoiding the IoT Zombie Apocalypse. 

Hanna’s session will examine the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai.  These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus even mighty giants like Twitter and Netflix have been laid low. Hanna will address new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks and to prevent the IoT from being the problem in security.

TCG offers guidance on IoT security and the role of trust and trusted hardware in several documents that include input across the industry. The architect’s guide can be found here (

Guidance to IoT security can be found here (

Learn more and register for the event here,


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More