Members of Trusted Computing Group announced new efforts to provide foundational security for industrial systems in increasingly connected factories and other industrial environments facing growing security threats.
“The connection of manufacturing, critical infrastructure and other industries to the Internet brings many benefits, but the associated potential for ransomware and malicious attacks presents major risks that can cause chaos for businesses and their customers and partners,” said TCG Embedded Systems Work Group and Industrial Sub Group Chair Steve Hanna, Infineon. “TCG members offer deep experience in embedded security that can be applied to industrial security, whether connected or not, to protect the systems, data and networks that we all rely on daily.”
The Industrial Sub Group will develop guidance for securing industrial equipment and a profile for using TPM 2.0 in industrial equipment. TCG members have contributed to the development of the Industrial Internet Consortium (IIC) Internet Security Framework, which recommends using the TPM to secure endpoints.
Monty Wiseman’s professional focus is in Platform Identity and Integrity. During the last 16+ years Monty was a leading contributor to various Platform TCG specifications. Monty is currently a Principle Engineer at General Electric focusing on security for GE’s Industrial Internet Control Systems. Prior to GE, Monty held various senior architectural positions at Intel, Novell, Sanyo/Icon, Fujitsu Microelectronics and Control Data Corporation. Monty’s first experience with computers was in 1974 building and developing software for the Altair 8800 using the “new” Intel 8080.
Steve Hanna is a Senior Principal at Infineon Technologies. He is co-chair of the Embedded Systems Work Group in the Trusted Computing Group (TCG) and a member of the Security Area Directorate in the Internet Engineering Task Force. Hanna also serves as the liaison from the TCG to the Industrial Internet Consortium. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 43 issued U.S. patents, and a regular speaker at industry events. He holds a Bachelor’s degree in Computer Science from Harvard University.
|Standards for Securing Industrial Equipment|
|Architect’s Guide: IoT Security|
|TCG Guidance for Securing IoT|
|TNC IF-MAP Metadata for ICS Security|
|Architect’s Guide: ICS Security Using TNC Technology|
|Industrial Internet Security Framework|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.