Trusted Computing Group (TCG) to Discuss Trust, Security and Internet of Things (IoT) at Embedded Systems Conference Silicon Valley 2015

Date Published: July, 01, 2015

PORTLAND, Ore., July 15, 2015Trusted Computing Group will present and demonstrate how trust enables better security in the Internet of Things (IoT) at the Embedded Systems Conference (ESC) Silicon Valley 2015.

TCG, which has developed numerous specifications including the Trusted Platform Module, self-encrypting drives and trusted networks, will host a training session Tues., July 21, 10:00 a.m. Steve Hanna, TCG IoT committee co-chair, will discuss “The Untrusted IoT: A Path to Securing Billions of Insecure Devices” in the Newport Room, Santa Clara Marriott. His talk will address the role of trust in the IoT and how developers can embed trust for enhanced security.

At Pedestal 5 in the exhibition area, TCG will demonstrate the application and benefit of trust in a smart building scenario, with technologies from Cisco and Infineon ensuring that data from sensors and actuators managed in the cloud and connected on the public Internet are secured using authentication via the TPM. Integrity reports are provided as well and security threats, including malware and fake devices, are detected and blocked, using open source code supporting TCG’s Trusted Network Communications specifications and a variety of vendor devices.

More than 2,000 technical professionals and embedded systems hardware, software, and firmware developers will attend ESC Silicon Valley July 20-22, 2015 to learn about the latest techniques and tips for reducing time, cost, and complexity in the embedded development process.

TCG offers an active Embedded Systems Work Group, which includes a committee dedicated to IoT security. That work group also has published a new spec for the TPM in automotive security. Companies wishing to join TCG in its standards development efforts and application of TCG specifications to embedded systems and other environments can find more information on membership at

About TCG
More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Tweet this: Trust=security in #IoT. @ESC_Conf July 21, learn why, how & see in action @TrustedComputin @ciscosecurity @Infineon


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More