TCG’s February 29 RSA Conference Session Features Google, Center for Internet Security, Microsoft and More to Talk IoT Security

Date Published: February, 05, 2016

TCG’s February 29 RSA Conference Session Features Google, Center for Internet Security, Microsoft and More to Talk IoT Security

If you are planning to attend RSA Conference starting later this month, make sure to check out the Monday, Feb.29 session hosted by Trusted Computing Group. This half-day seminar with demonstrations has attracted thousands of attendees over the last years, and generally fills up quickly, so add to your agenda here.

If you need an Expo pass for the Monday sessions and exhibits, TCG also is offering a code, 16UTCGXPO.

So why spend your Monday morning with TCG? We have put together a blockbuster session that will feature some of the industry’s brightest minds and cutting edge technologies working on security – in particular, the knotty problems of cybersecurity in the ever-expanding Internet of Things.

Doug Cahill, senior analyst cybersecurity for ESG, will kick off with a look at security and trust from the cloud to the IoT and offer new information gleaned from recent research. Cahill will be followed by a panel on trust, security and the IoT, moderated by Darin Andersen, CyberTECH and leading smart cities and IoT security expert, with Max Senges of Google and Lee Wilson, Security Innovation.

In a second panel, Paul Roberts of The Security Ledger will lead debate and discussion about using the TPM for trust and security with new insights about Windows from Microsoft’s Paul England and a look at open source support and the demands of smaller footprint applications in embedded systems and the IoT from Matthew Garrett, CoreOS. Both have worked extensively with the TPM and associated software stacks.

A third panel hosted by Larry Ponemon, Ponemon Institute, will examine the role of network security in the IoT with insights from Steve Venema, PolyVerse and Tony Sager, the Center for Internet Security.

TCG also will provide a brief update from its executive director, Mark Schiller, on its push into IoT security and how its specifications apply.

Stick around for some great giveaways. Adjacent to our session also will be some two dozen multi-vendor demonstrations of TCG specifications, from the TPM to self-encrypting drives, in action across the enterprise and in the IoT. Watch for more on these demos in this blog.

The complete agenda is here!

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more