Trusted Computing Group Webcast September 20 to Discuss How to Close Security Gaps in the Internet of Things

Date Published: September, 12, 2016

PORTLAND, ORE., Sept. 12, 2016 — Trusted Computing Group (TCG) and members GlobalSign and Cisco will discuss and demonstrate key techniques for closing critical IoT security gaps in a number of applications and endpoints in a webcast September 20.

Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international ISO standards-based Trusted Platform Module (ISO/IEC 11889:2015).

TCG experts also will look at the example of smart buildings, in which endpoints must be checked for integrity, allowed safely on a network and exchange data with the cloud – all securely and without the introduction of malware or other attacks. Attendees also will learn how these technologies can be applied to many endpoints.

Attendees will learn key vulnerabilities of IoT endpoints, networks and data and learn how to secure them using widely available tools and technologies.

The webcast will be held Tuesday, Sept. 20, 2016, 12:00 p.m. Eastern/9:00 a.m. Pacific. The webcast also can be replayed with registration. Register for the free event here:

                        http://www.trustedcomputinggroup.org/event/securing-iot-endpoints-networks-cloud-webcast/

About TCG

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.  More information is available at the TCG website, trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

— 30 —

Brands and trademarks are the property of their respective owners.

 

Tweet this: Secure #IoT endpoints, ensure device identity/integrity #TPM Sept. 9 webcast @Cisco @GlobalSign http://ow.ly/hQWE303fs6Rg

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More