TRUSTED COMPUTING GROUP ADDS SPEAKERS, DEMOS AND MEDIA PARTNERS TO FEBRUARY 29 RSA CONFERENCE 2016 SESSION
Session to Include Keynote from Enterprise Security Group, Panels, Demos and Ask the Expert Session
PORTLAND, Ore., Jan. 18, 2015 – Trusted Computing Group (TCG) today updated its agenda for the session “Securing the IoT with Trusted Computing” on Monday, February 29 at the RSA Conference 2016, San Francisco (#RSAC), 8:30 a.m. – 12:30 p.m. in Moscone West 2002/2006.
Doug Cahill, Senior Analyst for Cybersecurity at the Enterprise Strategy Group (ESG), will open the session with a keynote, “Trust-Based Security for Multi-Dimensional Clouds”, featuring recent research. Doug has more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets. Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9.
The session will include an Ask the Expert session on the TPM 2.0 specification, its implementation and supporting software. TCG also will offer a limited number of the recently published “A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security” and an opportunity to meet one of the authors.
Three panels will cover IoT, the TPM and network security. Panelists include:
• Darin Andersen, CyberTECH, with Max Senges of Google and Lee Wilson, Security Innovation
• Paul Roberts, SecurityLedger, with Paul England of Microsoft and Andrew Cathrow, VeriSign
• Larry Ponemon, Ponemon Institute, with Steve Venema of Polyverse and Tony Sager, Center for Internet Security
More than 20 demonstrations will round out the event. Demos will include enterprise, embedded, automotive and IoT applications of TCG standards and technologies.
The TCG session is open to all registrants, including those with Expo passes, of the RSA Conference. Complementary Expo passes using the code 16UTCGXPO are currently available here.
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available here. Follow TCG on Twitter and on LinkedIn.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.