TCG Adds Speakers, Demos, Book Giveaway to February 29 RSA Conference 2016 Session

Date Published: January, 11, 2016

Session to Include Keynote from Enterprise Security Group, Panels, Demos and Ask the Expert Session

PORTLAND, Ore., Jan. 11, 2016 – Trusted Computing Group (TCG) today updated its agenda for the session “Securing the IoT with Trusted Computing” on Monday, February 29 at the RSA Conference 2016, San Francisco (#RSAC), 8:30 a.m. – 12:30 p.m. in Moscone West 2002/2006.

Doug Cahill, senior analyst for cybersecurity at the Enterprise Strategy Group (ESG), will open the session with a keynote featuring recent research. Doug is a senior analyst covering cybersecurity at ESG, drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets. Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9, where he launched market leading products and forged strategic partnerships.

The session will include an Ask the Expert session on the TPM 2.0 specification, its implementation and supporting software. TCG also will offer a limited number of the recently published “A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security” and an opportunity to meet one of the authors.

The first panel will examine the role of trusted computing in securing the IoT ecosystem. A second panel will look at implementing the TPM in enterprise and IoT applications. Connecting IoT devices and securing legacy and new network connections will be the focus of the final panel. Panelists include:
Darin Andersen, CyberTECH, with Lee Wilson, Security Innovation
Paul Roberts, SecurityLedger, with Paul England, Microsoft and Andrew Cathrow, VeriSign
Larry Ponemon, Ponemon Institute, with Steve Venema, Polyverse and Tony Sager, Center for Internet Security

More than 20 demonstrations will round out the event. Demos will include enterprise, embedded, automotive and IoT applications of TCG standards and technologies.

The TCG session is open to all registrants, including those with Expo passes, of the RSA Conference. Complementary Expo passes using the code 16UTCGXPO currently are available here.

About TCG
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available at Follow TCG on Twitter and on LinkedIn.
Tweet this: 2016 #RSAC @TrustedComputin session: 20+ great #IoT, enterprise sec demos + 3 panels. Ask Expert, book giveaway.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More