- This event has passed.
Event Navigation
RSA 2013 – Trusted Computing: Billions of Secure Endpoints in 10 Years
Monday, February 25, 2013, GMT-0700
This page contains all the relevant materials for the Trusted Computing Group’s Association Monday Seminar at RSA Conference USA 2013.
Trusted Computing: Billions of Secured Endpoints in 10 Years
When: Monday, February 25, 2013 | 10:00am – 2:00pm
Where: Esplanade Room 301, Moscone Center South
Marking its 10th anniversary and the adoption of Trusted Computing technologies and specifications in more than a billion endpoints, Trusted Computing Group hosted its annual RSA Conference session.
Videos of RSA Conference Keynote and Panels:
- TCG Overview
- Keynote Presentation: Top 10 Priorities in IT Security for the County of Los Angeles and the Importance of Industry Standards
- Panel: Advanced Persistent Threats and NIST SP 800-147 and NIST SP 800-155
- Panel: Network Security, Critical Infrastructure and BYOD
- Panel: Protecting Content from Unauthorized Access
Reference Materials:
- Seminar Program Guide: Speaker and Demonstration Showcase Information
- Press Release: Trusted Computing Group Members to Show RSA Attendees Demos of Secure Drive, BYOD, Authentication, Embedded and Mobile at Monday Seminar Session
- Presss Release: Los Angeles County CISO Robert Pittman to Keynote Trusted Computing Group RSA Conference USA 2013 Seminar
- Architect’s Guide: Security Automation Using TNC and SCAP Technology
- Architect’s Guide: Comply to Connect Using TNC Technology
- Architect’s Guide: Bring Your Own Device (BYOD) Security Using TCG Technology
- Architect’s Guide: Mobile Security Using TNC Technology
- White Paper: The Case for Turning on Trusted Platform Modules
- Keynote Address: The Top 10 Priorities in IT Security for the County of Los Angeles
Session Agenda:
[fusion_text]
Time | Session |
---|---|
10:00AM | Welcome and Opening Remarks – Brian Berger, Trusted Computing Group Director |
10:05AM | Keynote Session: Top 10 Priorities in IT Security for the County of Los Angeles and the Importance of Inudstry Standards Robert Pittman, MPA, CISM, Chief Information Security Officer, County of Los Angeles |
10:30AM | Panel Session: Advanced Persistent Threats and NIST SP 800-147 and NIST SP 800-155 Moderator: Paul Roberts, Security Ledger, Panelists: Frank Molsberry, Dell, Stacy Cannady, DMI, Sunil Gottumukkala, Microsoft, Dave Waltermire, NIST |
11:15AM | Networking Break and Demonstration Showcase |
11:30AM | Panel Session: Network Security, Critical Infrastructure and BYOD Moderator: Phil Schacter, Gartner Panelists: Phyllis Lee, NSA, Steve Venema, The Boeing Company, Bob Thibadeau, Wave Systems Corp. |
12:15PM | Lunch and Demonstration Showcase |
1:05PM | Panel Session: Protecting Content from Unauthorized Access Moderator: Eric Ogren, Ogren Group Panelists:Michael Willett, Samsung, Hussein Syed, Barnabas Health, Clain Anderson, Lenovo |
1:45PM | Closing Remarks and Raffle Drawing |
1:55PM | Networking Break and Demonstration Showcase |
Demonstration Showcase Participants:
[fusion_text]
Time | Session |
---|---|
Absolute Software | Securing Mobility |
Asgaurd Networks | Juniper Networks | Practical Network Segmentation for Manageable Industrial Control Systems Security |
Fraunhofer SIT | Security for Dynamic and Ad-Hoc Networks |
Lumeta | Juniper Networks | Infoblox | Plugging the Leaks: Security Automation |
Identive | Infoblox | Juniper | Physical/Access Control Integration through IF-MAP |
Microsoft | Juniper Networks | Infoblox | Data Protection in a BYOD World: Security Automation |
MITRE | Feasibility of High Security TPM Provisioning Processes in the Enterprise |
NCP | Automated Security for Remote Systems |
Nokia | Trusted Computing in Nokia Lumia |
Samsung | Solid-State Self-Encrypting Drives: Where is your data tonight? |
Wave | Leveraging the TPM to Provide Device-based Multifactor Authentication |
WinMagic | Managing OPAL-Compliant Drives in Windows 8 and UEFI with Secure Boot |