
- This event has passed.
Event Navigation
RSA Conference 2015: TCG Association Seminar
Monday, April 20, 2015, GMT-0700
When: Monday, April 20, 2015 9:00AM – 1:00PM
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions
Resources Available for Download:
- TCG Seminar and Demo Showcase Program Guide
- Introduction Presentation – PDF
- 20 Story Snow Castle Presentation – PDF
- Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and Intel
Please visit https://twitter.com/TrustedComputin for up-to-date tweets regarding RSA. Use #RSAC and #TPM
Session Schedule:
[fusion_text]
Topic | Speakers |
---|---|
Welcome and Introduction to the Trusted Computing Group (TCG) | Dr. Joerg Borchert – President, Trusted Computing Group |
20-Story Snow Castle: Why We Need a New Foundation for the Internet of Things | Paul Roberts, Founder and Editor and Chief, Security Ledger |
Panel: Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise | Moderator: Paul Roberts, Security Ledger Panelist:
|
Panel: The Insecure Internet of Things and How to Secure It | Moderator: Rich Nass, Executive Vice-President, Embedded-Computing.com, OpenSystems Media Panelist:
|
Panel: Mobile is King, But Security Must Be a Priority | Moderator: Jai Vijayan; Technology Editor/Writer Panelists:
|
Demonstration Showcase Participants:
[fusion_text]
![]() |
Topic |
---|---|
![]() |
Endpoint Compliance with Self-Encrypting Drives (SEDs) |
![]() |
Secure your Data with TPM |
![]() ![]() ![]() ![]() |
Securing IoT with Trusted Computing |
![]() |
Quitting the Gamble of Trusting Insiders with Corporate Data |
![]() ![]() |
Near Real-Time Network Security with an IF-MAP-Based SIEM Approach |
![]() |
Dell Data Protection | Host Crypto Accelerator (HCA) and TPM Integration |
![]() |
Establishing Trust with Embedded Actuators in the IoT |
![]() |
Remote Firmware Update for Vehicle ECU with a TPM |
![]() |
Trusted Computing in Network Device |
![]() |
Trusted Device Lifecycle Management for End-to-End Security |
![]() |
Intel Security Critical Infrastructure Protection (CIP) – For Managed IoT Security |
![]() |
TPM 2.0 Family Enabling for Linux |
![]() |
Cloud Data Security Gateway |
![]() |
JW Secure Strongnet Secure Admin |
![]() |
Microsoft Windows Internet of Things – Trusted I/O |
![]() ![]() ![]() |
BYOD Solutions Well in Hand: Standards-Based Mobile Security |
![]() ![]() |
Breach Containment: Standards-Based Security Automation for Coordinated Threat Control |
![]() ![]() |
Using TCG Technologies in a Real World Cloud Setup |
![]() ![]() |
Dynamic Overlay Protection for Industrial Control Systems |
![]() |
Wave Virtual Smart Card 2.0: Two-Factor Authentication with TPM |
![]() ![]() |
The Fast, Risk-free Way to Deploy SEDs: Wave Cloud |
![]() ![]() |
SED Management with TPM Protection |