TCG’s Japan Regional Forum to Showcase Security Solutions and Some of Japan’s Most Exciting Scientific Minds

Date Published: November, 01, 2014

Trusted computing, and indeed security challenges, resonate worldwide with IT and security professionals as well as with makers and developers of computing and networking equipment and devices. TCG’s regional forums, in China and Japan, help educate users and developers about trusted computing standards and how to deploy products using these standards. For the sixth year, the Japan Regional Forum will host a workshop. This year’s session is Wednesday, December 3, 2014 at Akihabara UDX in Tokyo.

Not a member of TCG? The event is open to both members of the Trusted Computing Group and non-members. This event has been a great venue to learn more about TCG and trusted computing as well as see a number of unique and interesting demonstrations using products from a range of companies – and these demos typically offer great tips and advice for using TCG technologies today to solve security problems in the enterprise.

This event will also include some terrific speakers from the leading scientific and technical institutions of Japan to address the current  situation in cyber security in Japan and other countries. Speakers will include Masafumi Oe, National Astronomical Observatory of Japan (NAOJ); Ariyasu Suzaki, National Institute of Advanced Industrial Science and Technology (AIST; and Atsuo Inomata, Nara Institute of Science and Technology (NAIST).

In addition, attendees can network with speakers and security professionals and review the demonstrations.

If you are interested in attending the event please contact TCG Administration – Japan Contact ([email protected]) for more details and registered to the event. Registration will close on Friday, November 28 Japan Time.

More info on the Japan Regional Forum will be available here:



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More