Portland, Oregon, USA, May 26, 2015 –Trusted Computing Group, a standards group working to help secure the IoT and other computing devices and infrastructure, will participate as a speaker and association sponsor at Embedded TechCon on June 8th-10th, 2015.
Stefan Thom, senior security architect/software development engineer, Microsoft and TCG member representative for IoT, will speak on June 10, 4:30 p.m., on “Applying Trusted Brokered IO As the Trust Boundary and Policy Enforcement Point in Hardware for IoT Devices.” To register, go to https://reg.mpassociates.com/reglive/PromoCode.aspx?confid=195.
Embedded TechCon features classes taught by leading industry experts that will cover key embedded topics like IoT, automotive, and security, while drawing from the industry’s roots with topics like firmware development, debugging, and open-source hardware and software. The event is hosted by OpenSystems Media as an extension of its on-line educational program, known as Embedded University, and is co-hosted with the Design Automation Conference at Moscone Center, San Francisco.
“The security of legacy and new IoT devices is a huge concern for all of us in the industry,” noted Mark Schiller, TCG executive director. “Embedded TechCon offers developers and others a great way to learn more about these security vulnerabilities and how to create more secure systems with proven concepts of trust.”
TCG recently published “TCG Guidance for Securing the IoT” that includes typical IoT security use cases and provides guidance for applying TCG technology to those use cases. The group also recently a new specification for use of the TPM in automotive applications and displayed a number of demos for IoT applications during the recent RSA event. More information about TCG and IoT security can be found at http://www.trustedcomputinggroup.org/solutions/internet_of_things.
To view the complete schedule for Embedded TechCon and to register, visit: http://embeddedtechcon.com/schedule.php
Companies wishing to join TCG in its standards development efforts can find more information on membership at https://trustedcomputinggroup.org/membership.
More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.