TCG’s Steve Hanna Talks IoT Security with IoT Evolution in New Podcast

Date Published: June, 26, 2017

TCG’s Steve Hanna often speaks and writes on the concepts of trusted computing and its role in helping secure the very vulnerable IoT and embedded systems in his role as co-chair of several TCG work groups. This week, Steve sits down with Ken Briodagh, of IoT Evolution, to look at some of the hottest issues around IoT security – including securing network equipment, in a new podcast available at and on iTunes and other podcast applications.


The episode is sponsored by IoT Evolution Expo, the leading IoT-focused enterprise event in the Internet of Things, to be held July 17 to 20 at Caesars Palace, Las Vegas. TCG will be there in Booth #307 (  to demonstrate how to use trust and its role in securing smart buildings and the industrial IoT.


You can also catch Steve in person at the IoT Evolution Expo:


Securing the Industrial IoT: Wednesday, July 19th 1:30pm

IoT Security Strategies Mastering the Zones of Trust: Wednesday, July 19th 5:00pm

Register using code TCG25 before June 30 for discounted super passes to catch all the demos and sessions. More info at


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More