Trusted Computing Group to Show Securing the Internet of Things at July 11-14 IoT Evolution Expo

Date Published: July, 05, 2016

TCG and Cisco Systems Expert to Address Remote Monitoring and Management and IoT Standards in Panel Sessions

 PORTLAND, Ore., July 5, 2016 – Trusted Computing Group and members will speak on securing the Internet of Things at the IoT Evolution Expo July 11-14, Las Vegas. Members also will show how to protect the IoT with trusted computing in Booth 612.

Stacy Cannady, CISSP and technical marketing for Trustworthy Computing
TRIAD (Threat Response, Intelligence, and Development) for Cisco Systems, will speak on two panels to address IoT vulnerabilities and how proven concepts of trust, including the Trusted Platform Module, or TPM, can be used with other TCG technologies to help secure data, networks and devices across the spectrum of connected things.

In the first session IOTS-02, “Remote Monitoring and Management”, Tues., July 12, 3:00pm, in the Forum 22 room, panelists will look at how remote monitoring and management systems impact security solutions.

On Wed., July 13, Cannady will join other experts in IOTT-06 session at 12:15 p.m. in Forum 4 to examine industry standards for the Internet of Things.

TCG will host several demonstrations in the exhibit area in Booth #612. WIBU Systems will show how to use the TPM and discuss how to protect intellectual property against attackers, who exploit software vulnerabilities to create counterfeit products, sabotage data or steal information. Cisco Systems with Infineon will demonstrate protecting a typical smart building with the TPM and the TCG TNC network security architecture. Data across the network and in the cloud is protected and authentication ensures authorized access to the smart building application.

Demonstrations are available Tues., July 12th, 5:00 p.m. – 7:00 p.m.; Wed., July 13, 12:00 – 5:00 p.m.; and Thurs., July 14, 11:00 a.m. – 2:00 p.m.

TCG recently published guidance to industry on securing the Internet of Things, which can be found here.  TCG also published an IoT architect’s guide.

About TCG

More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website.  Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Tweet this: See trust #TPM protecting IP, licenses & smart buildings @IoTEvolution @TrustedComputin July 11-14


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More