Trusted Computing Group Headlines Chip-To-Cloud Security Forum with Keynote, Panels and Sessions on Trust and Security

Date Published: September, 01, 2014

Speakers from Cisco Systems, Fraunhofer SIT, Infineon Technologies and Microsoft to Talk About Mobile, Cloud and IoT Security

PORTLAND, Ore., Sept. 9 2014 – How can trust enable better security? Presentations and demos from Trusted Computing Group will focus on that question at the Chip-to-Cloud Security Forum, Sept. 23-25, 2014.

Dr. Joerg Borchert, TCG president and chairman, Infineon Technologies, will discuss how trust can enable more secure cloud computing in a keynote at the plenary session Sept. 23. The plenary will also include a panel session, “Virtualization and Risks: The Impact of Virtualization Technologies on Mobile Transactions Security” with Janne Uusilehto, Microsoft and co-chair, TCG Mobile Platform Work Group and other industry experts.

A session in the cloud services security track also on Sept. 23 will include a look at trust in the cloud from Stacy Cannady, Cisco Systems. Also in that session, Henk Birkholz, Fraunhofer SIT, will talk to attendees about “Security Automation Tips, Tricks and Techniques.”

The Sept. 24, session “The Role of the Root of Trust in Today and Tomorrow’s Cybersecurity” will include a presentation by Nicolai Kuntze, Fraunhofer SIT, on TPM 2.0. A panel, led by Borchert with Cannady and Kuntze, will look at the challenges and prospects in deploying TPM 2.0.

That day, Cannady will host a session in the M2M and Internet of Things track, “Who Can You Trust in the Internet of Things?”.

Mobile security, including the mobile TPM and the Trusted Execution Environment, or TEE, will be the focus of a talk by Uusilehto on Sept. 24 in the session “Creating Trust on Mobile Platforms.”

During the conference, Cisco Systems will demonstrate enforcing trust in cloud servers, and Infineon Technologies will demonstrate TPM 2.0 for embedded applications.

Get more information here,

The Chip-to-Cloud Security Forum provides the digital security community with an independent platform dedicated to advance end-to-end digital security. The Forum will cover the latest trusted technologies advances in embedded, mobile, M2M, IoT and cloud environments.

More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Tweet this: TCG members Cisco, Infineon, Microsoft, Fraunhofer SIT talk trust, security in mobile, cloud, virtual, IoT and embedded apps at Chip-to-Cloud Security Forum Sept.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More