New Work from TCG to Be Presented at IoT Evolution Expo and July 25 Webcast
PORTLAND, ORE. June 28, 2017 – Today’s enterprises and Internet of Things rely on complex connected networks – networks that often are highly insecure. Trusted Computing Group (TCG) has published new guidance to protecting networks and its experts will address how this new work can be used to protect networks at two upcoming events: the IoT Evolution Expo and a separate TCG-hosted webcast.
The integrity of network equipment, including routers, switches and firewalls, is critical to protecting data in motion, data at rest and the equipment itself. However, increasingly sophisticated and frequent attacks have compromised networks across the globe, putting business operation, financial info and personal data at risk.
Steve Hanna, Principal at Infineon and co-chair of several TCG work groups, will talk with attendees of the IoT Evolution Expo Wednesday, July 19, 1:30 p.m. PDT on the topic of network security and securing the industrial IoT. The panel session will look at challenges with securing network gear and ways to implement strong security.
TCG members will demonstrate network security and address security in the industrial IoT in Booth #307 Tuesday evening, July 18 through Thursday, July 20 at Caesars Palace, Las Vegas at the Expo.
Registrants can use code TCG25 for discounted super passes through June 30, 2017.
On July 25 at 1:00 p.m. EDT, Hanna and Michael Eckel, security technologist, Huawei Technologies, will present a TCG-hosted webcast on the group’s Guidance for Securing Network Equipment to address network equipment security for both devices and services. Use cases and implementation approaches to solve security problems will be addressed. Attendees will learn about using device identity, securing secrets, protecting configuration data, inventorying software, conducting health checks and more.
More information and registration for the free webcast can be found here.
About TCG
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information is available at the TCG website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.
— 30 —
Brands and trademarks are the property of their respective owners.
Tweet this: Join @Infineon TCG booth #307 new demos+talk July 19 #IoTsecurity @IoTEvolution Expo 7/17-20. bit.ly/29sAywq
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.