Securing the IoT with Trusted Computing Half-day Seminar and Demonstration Showcase
When: Monday, February 29, 2016 8:30am – 12:30pm
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase)
Resources Available for Download:
- TCG Program Guide: includes sessions, schedules, complete demonstration showcase descriptions, speaker biographies and headshots.
- Press Releases: includes session topics, including moderators and panelists
- IoT Infographic
PRESS surrounding TCG’s IoT Panels and Demonstrations:
- Google: Lessons of Android Shape IoT Vision (Security Ledger)
- RSA Conference 2016: Day 1 (Network World)
- RSA Conference 2016, Day One (ESG)
The free session included three thought-provoking panels and 20+ demonstrations of trust and standards in the enterprise and the IoT.
Keynote speaker Doug Cahill, Senior Analyst, ESG, discussed recent findings on security, networks and the cloud. IoT security expert Darin Andersen, chairman and founder of CyberTECH, led a panel on vulnerabilities in the IoT and how trust might support better security. Lee Wilson of Security Innovations and Max Senges of Google joined Andersen.
A second panel, moderated by Paul Roberts, founder and editor-in-chief, Security Ledger,
looked at the newest and best ways to implement the TPM. He was joined by Paul England, Software Architect, Microsoft Corporation and examined new tools in Windows 10 and by Matthew Garrett, Principal Security Software Engineer, CoreOS.
The third panel moderated by Derek Harp, Director for ICS Global Programs at SANS, focused on securing the connection and included Steve Venema, senior architect of Polyverse Corporation, and Tony Sager, Senior Vice-President and Chief Evangelist, Center for Internet Security. The group looked at the issues related to connecting IoT devices and
securing legacy and new network connections.
Monty Wiseman, Intel Corporation, hosted an “ask the expert” on the #TPM, associated software and how to implement it.
TCG offered a limited number of the new book ,“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”,
from Apress and TCG members from IBM, Intel and Johns Hopkins University Applied Physics Laboratory were at the event.
Follow TCG on Twitter!
|8:30 AM||Welcome/Introduction to SessionDemos open in adjacent room||Mark Schiller, TCG Executive Director|
|8:40-9:15 AM||Keynote: Trust-Based Security for Multi-Dimensional Clouds||Doug Cahill, Senior Analyst for Cybersecurity, Enterprise Strategy Group (ESG)|
|9:15-10:00 AM||Panel 1: IoT, Trust and Security||Moderator: Darin Andersen, CEO and President, CyberTrust
Panelists: Lee Wilson, Product Development Engineer, Security Innovation, Max Senges, Product Manager, Google
|10:00-10:10 AM||Update from TCG and Demo Highlights||Mark Schiller, TCG Executive Director|
|10:10-10:55 AM||Panel 2: Things to Do with the TPM||Moderator: Paul Roberts, Editor and Chief, Security Ledger
Panelists: Paul England, Software Architect, Microsoft Corporation, Matthew Garrett, Principal Security Software Engineer, Core OS
|11:05-11:50 AM||Panel 3: Network Security in the IoT||Moderator: Derek Harp,Director ICS Global Programs, SANS
Panelists: Steve Venema, Senior Security Architect, Polyverse, Tony Sager, Senior VP and Chief Evangelist, Center for Internet Security
|11:50-12:00 PM||End of Seminar – Live Raffle Drawing for Prizes|
|12:00-12:30 PM||Demonstration Showcase|