TCG Webcast February 15 to Show TPM and New Trusted Software Stack for Integrity, Authentication, Health Monitoring and More.

Date Published: January, 30, 2018

PORTLAND, Ore., Jan. 30, 2018 – How to use the Trusted Platform Module? Trusted Computing Group (@TrustedComputin) will address that question and more in a webcast, How to Implement Trusted Platforms and EcoSystems, Thursday, Feb. 15, 1:00 p.m. Eastern/10 a.m. Pacific.

Trusted Computing provides foundational security for enterprise, embedded and IoT devices to prevent breaches, data loss and attacks.

Long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security and chair of TCG’s Software Stack (TSS) and Virtualized Platform Work Groups, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

Attendees will learn about the changes to TSS to make use much easier and more efficient, and how to start developing applications and resources. Use cases including key storage and software measurement will be addressed, along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed. Attendees also will learn about newly available software and resources for faster development.

Register here:

TCG has expanded its concept of trust and security from enterprise computing and networking to embedded, IoT, and network equipment security with new work groups and subgroups and a number of new specifications and guidance documents.

About TCG

TCG develops, defines and promotes open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available at Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More