In-Depth Panels and Demonstrations to Look at Growing Need for Trust in Computing Across Enterprise, IoT And Mobility
PORTLAND, Ore., March 9, 2015 –Trusted Computing Group and members will host a half-day RSA Conference 2015 session with a focus on the growing need for trust in cloud and mobile computing and the expanding Internet of Things (IoT). The April 20 event also will offer attendees more than 20 demonstrations.
“Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” will be held in Moscone West 2002/2006, 9 a.m. – 1 p.m. Pacific Monday, April 20. Panels will address the concepts of “do I know you, can I trust you?” with an emphasis on the rapidly growing amount of sensor data, personally identifiable information, financial transactions and health data, and intellectual property going through a variety of networks and touching a variety of devices. These devices typically are unencrypted and vulnerable to loss, theft and attack.
In an opening talk for the session, Security Ledger Editor-in-Chief Paul Roberts will identify some of the pain points in the rapid transition to the Internet of Things and discuss some promising efforts (including those of TCG) to provide a robust, secure and scalable foundation on which a vibrant IoT might be built.
The first panel, moderated by Roberts, will address the role of trust and potential for the TPM to address current and emerging security solutions. Amy Nelson, engineering technologist, principal engineer at Dell; Dave Bossio, group program manager, OSG Enterprise and Security R&D, Microsoft; and an enterprise user will look at the enterprise’s need for trust and its impact on security.
Experts then will turn their attention to the Internet of Things, or IoT, and its need for trust and security. Rich Nass, EVP and brand manager for embedded at OpenSystems Media, will guide panelists including Darin Anderson, president and CEO of CyberUnited; Chuck Benson, assistant director for IT, facilities services at University of Washington and Stacy Cannady, engineer technical marketing, Cisco Systems.
Jai Vijayan, technology journalist, will lead the final panel to examine mobile computing and the cloud. Gil Bernabeu, GlobalPlatform technical director; Jon Geater, chief technology officer, Trustonic; and Lee Neely, senior cyber analyst , Lawrence Livermore National Laboratory, will offer perspectives on how to secure the rapidly growing ecosystem based on mobile computing that connects to the cloud and the potential role of trust.
TCG will offer a limited number of the new book ,“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”, from Apress and TCG members IBM, Intel and Johns Hopkins University Applied Physics Laboratory at the event.
Brands and trademarks are the property of their respective owners.
Tweet this: Register now-almost full @TrustedComputin #RSAC session 4.20 Moscone West. Chance for free #TPM book http://bit.ly/1z0RJQ9
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.