April 20, 2015 – April 24, 2015
Moscone Center, San Francisco, CA
TCG Seminar and Demonstration Showcase
When: Monday, April 20, 2015 9:00AM – 1:00PM
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions
Resources:
Please visit https://twitter.com/TrustedComputin for up-to-date tweets regarding RSA. Use #RSAC and #TPM
[fusion_text]
Topic | Participants |
---|---|
Welcome and Introduction to the Trusted Computing Group (TCG) | Dr. Joerg Borchert – President, Trusted Computing Group |
20-Story Snow Castle: Why We Need a New Foundation for the Internet of Things | Paul Roberts, Founder and Editor in Chief, Security Ledger |
Panel: Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise | Moderator: Paul Roberts, Security Ledger Panelist:
|
Panel: The Insecure Internet of Things and How to Secure It | Moderator: Rich Nass, Executive Vice-President, Embedded-Computing.com, OpenSystems Media Panelist:
|
Panel: Mobile is King, But Security Must Be a Priority | Moderator: Jai Vijayan; Technology Editor/Writer Panelists:
|
[fusion_text]
Participant | Topic |
---|---|
Endpoint Compliance with Self-Encrypting Drives (SEDs) | |
Secure your Data with TPM | |
Securing IoT with Trusted Computing |
|
Quitting the Gamble of Trusting Insiders with Corporate Data | |
Near Real-Time Network Security with an IF-MAP-Based SIEM Approach | |
Dell Data Protection | Host Crypto Accelerator (HCA) and TPM Integration | |
Establishing Trust with Embedded Actuators in the IoT | |
Remote Firmware Update for Vehicle ECU with a TPM | |
Trusted Computing in Network Device | |
Trusted Device Lifecycle Management for End-to-End Security | |
Intel Security Critical Infrastructure Protection (CIP) – For Managed IoT Security | |
TPM 2.0 Family Enabling for Linux | |
Cloud Data Security Gateway | |
JW Secure Strongnet Secure Admin | |
Microsoft Windows Internet of Things – Trusted I/O | |
BYOD Solutions Well in Hand: Standards-Based Mobile Security | |
Breach Containment: Standards-Based Security Automation for Coordinated Threat Control | |
Using TCG Technologies in a Real World Cloud Setup | |
Dynamic Overlay Protection for Industrial Control Systems | |
Wave Virtual Smart Card 2.0: Two-Factor Authentication with TPM | |
The Fast, Risk-free Way to Deploy SEDs: Wave Cloud | |
SED Management with TPM Protection |
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.