Stacy Cannady, CISSP, is technical marketing – Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development) for Cisco and a member of the Trusted Computing Group’s Embedded Systems Work Group. He also serves as the primary board member representing Cisco.
Stacy has worked in the field of trusted computing for a number of years. As a subject matter expert in trusted computing, his responsibilities require an in-depth understanding of the trusted computing market, including advances in hardware and software security as well as vendor and customer market dynamics.
Prior to his work with Cisco, Stacy was responsible for marketing leadership for trusted computing at DMI, IBM and at Lenovo. At IBM, he played a principal role in making the TPM standard equipment in ThinkPad and ThinkCenter PCs. This created competitive pressure in the PC market and led to broad market acceptance of the TPM as standard equipment in enterprise-class PCs. Stacy was also responsible for the security product strategy for IBM’s PC Division and for Lenovo for eight years. This strategy required subject matter expertise in firmware security, biometrics, smart cards, identity management, encryption and access control. Additionally, at Lenovo, he was also responsible for incident response and served as Privacy Manager for the Software & Peripherals Business Unit.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.