Trusted Computing Group, with Embedded Computing Design, will Address IOT Security at June 28 Sensors Expo & Conference Workshop

Date Published: May, 09, 2018

TCG Members to Demonstrate Secure Network Equipment, Trusted Software Stack and Lightweight DICE Root of Trust in Booth #1539

PORTLAND, Ore., May 9, 2018 –  With Embedded Computing Design, Trusted Computing Group and its members Infineon, Microsoft and OnBoard Security will host a workshop to advise attendees on securing the vulnerable IoT on Thursday, June 28, 2018, at the Sensors Expo & Conference.

Recent attacks on vulnerable embedded and IoT systems have resulted in lost personal and corporate data, legal fines, lost customer trust and lost services. At worst, these attacks can shut down critical infrastructure. Yet, the majority of embedded and IoT devices, and the networks they operate on, remain unprotected.

The workshop Thursday, June 28th, 2018 from 1:00- 4:30 p.m. Pacific Daylight Time, Executive Ballroom E at the San Jose Convention Center, will be moderated by Brandon Lewis of Embedded Computing Design. The session is open to those with expo and conference passes and will address the role and implementation of a root of trust, the development of secure software to support a root of trust and how to embed trust and security into networks. Speakers include Steve Hanna, Infineon; Dennis Mattoon, Microsoft; and Lee Wilson, OnBoard Security. They who will address and show available solutions and technologies to secure embedded and IoT systems, networks and data in.

During the expo in Booth #1539 Wednesday, June 17, 10:00 a.m. – 6:00 p.m. and Thursday, June 28, 10:00 a.m. – 4:00 p.m., TCG will demonstrate the DICE lightweight root of trust, the TPM for network security and the Trusted Software Stack.

Register at http://ow.ly/wOK830j7yn3 and use code TCG100 for an expo pass and a $100 discount for a conference pass.

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.  More information is available at www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.