RSA Conference 2014: Get Proactive with Security

Date Published: February, 01, 2014

TCG hosted its annual workshop during RSA Conference 2014 on Monday, February 24, 2014

Monday Association Seminar:

Get Proactive with Security: A Session on Using Trusted Computing to Free Security Resources for the Day-to-Day Fires

Resources Available for Download:

  • Program Guide: includes sessions schedule, complete demonstration showcase descriptions, speaker bios and headshots
  • Press Release: includes session topics, including moderators and panelists
  • Press Release: Includes information on demonstration showcase and technologies in action by member companies

Session Agenda:

Title Speaker Video
Welcome and Introduction to the Trusted Computing Group (TCG) Dr. Joerg Borchert – President, Trusted Computing Group
Panel: Endpoint Compliance and Security Automation Moderator: Jon Oltsik – Senior Principal Analyst, Enterprise Strategy Group (ESG)
Panelists: Steve Whitlock – Chief Security Architect, The Boeing CompanyDan Griffin – Founder, JW Secure and Microsoft Enterprise Security MVPDave Waltermire – Security Automation Architect, NIST
Panel: Will the Real Trusted Platform Module (TPM)Please Stand Up? Moderator: Paul Roberts – Editor in Chief and Founder, The Security Ledger
Panelists: Gal Shpantzer – Security Consultant and Analysts , SANS, Monty Wiseman – Security Researcher, Intel Corporation, Dustin Ingalls – Partner Group Program Manager, Windows Security, Microsoft
Panel: Mobile Device Security: Fact or Fiction Moderator: Victor Wheatman – Global Information Security Market Analyst and Enterprise Advisor
Panelists: Eric Green – SVP, Business Development, Mobile Active Defense & Program Director, SC World CongressRick Doten – Chief Information Security Officer, DMI, Inc.Jason Conyard – Information Technology Vice President – Juniper Networks

Demonstration Showcase Participants:

Participants Title
absolute software corporation Seagate Technology Endpoint Compliance & Self-encrypting Drives
Asguard Networks Juniper Networks, Inc. Practical Network Segmentation for Industrial Control System Security
Mobile BYOD Security
Trust at HSH DECOIT GmbH HSR Near Real Time Network Security with Open Source Tools
Intel Corporation TPM Software Stack (TSS) System API
Juniper Networks, Inc. microsoft JW Secure, Inc. Data Protection in a BYOD World: Security Automation
Samsung Semiconductor, Inc. wave Solid-State Drives with Self-encryption: Solidly Secure
trusttonic Endorsement Credentials for TPM Mobile
Infineon Technologies AG Enhanced Embedded System Security Solutions Using TPMs
wave User and Device Identity Solutions: Virtual Smart Cards
WinMagic, Inc. Intel Corporation HP Inc. SED Management with HP Drive Encryption
WinMagic, Inc. Seagate Technology Security Automation Made Easy with Enterprise Drives


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.