- This event has passed.
Event Navigation
RSA Conference 2015: TCG Association Seminar
Monday, April 20, 2015, GMT-0700
When: Monday, April 20, 2015 9:00AM – 1:00PM
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions
Resources Available for Download:
- TCG Seminar and Demo Showcase Program Guide
- Introduction Presentation – PDF
- 20 Story Snow Castle Presentation – PDF
- Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and Intel
Please visit https://twitter.com/TrustedComputin for up-to-date tweets regarding RSA. Use #RSAC and #TPM
Session Schedule:
[fusion_text]
Topic | Speakers |
---|---|
Welcome and Introduction to the Trusted Computing Group (TCG) | Dr. Joerg Borchert – President, Trusted Computing Group |
20-Story Snow Castle: Why We Need a New Foundation for the Internet of Things | Paul Roberts, Founder and Editor and Chief, Security Ledger |
Panel: Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise | Moderator: Paul Roberts, Security Ledger Panelist:
|
Panel: The Insecure Internet of Things and How to Secure It | Moderator: Rich Nass, Executive Vice-President, Embedded-Computing.com, OpenSystems Media Panelist:
|
Panel: Mobile is King, But Security Must Be a Priority | Moderator: Jai Vijayan; Technology Editor/Writer Panelists:
|
Demonstration Showcase Participants:
[fusion_text]
Participant | Topic |
---|---|
Endpoint Compliance with Self-Encrypting Drives (SEDs) | |
Secure your Data with TPM | |
Securing IoT with Trusted Computing | |
Quitting the Gamble of Trusting Insiders with Corporate Data | |
Near Real-Time Network Security with an IF-MAP-Based SIEM Approach | |
Dell Data Protection | Host Crypto Accelerator (HCA) and TPM Integration | |
Establishing Trust with Embedded Actuators in the IoT | |
Remote Firmware Update for Vehicle ECU with a TPM | |
Trusted Computing in Network Device | |
Trusted Device Lifecycle Management for End-to-End Security | |
Intel Security Critical Infrastructure Protection (CIP) – For Managed IoT Security | |
TPM 2.0 Family Enabling for Linux | |
Cloud Data Security Gateway | |
JW Secure Strongnet Secure Admin | |
Microsoft Windows Internet of Things – Trusted I/O | |
BYOD Solutions Well in Hand: Standards-Based Mobile Security | |
Breach Containment: Standards-Based Security Automation for Coordinated Threat Control | |
Using TCG Technologies in a Real World Cloud Setup | |
Dynamic Overlay Protection for Industrial Control Systems | |
Wave Virtual Smart Card 2.0: Two-Factor Authentication with TPM | |
The Fast, Risk-free Way to Deploy SEDs: Wave Cloud | |
SED Management with TPM Protection |