RSA Conference 2016

Date Published: January, 01, 2015

RSAC 2016

Securing the IoT with Trusted Computing Half-day Seminar and Demonstration Showcase

When: Monday, February 29, 2016 8:30am – 12:30pm
Location: Moscone West, Room 2002 (Seminar) & 2006 (Demonstration Showcase) 

Resources Available for Download:

PRESS surrounding TCG’s IoT Panels and Demonstrations:

The free session included three thought-provoking panels and 20+ demonstrations of trust and standards in the enterprise and the IoT.

Keynote speaker Doug Cahill, Senior Analyst, ESG, discussed recent findings on security, networks and the cloud. IoT security expert Darin Andersen, chairman and founder of CyberTECH, led a panel on vulnerabilities in the IoT and how trust might support better security. Lee Wilson of Security Innovations and Max Senges of Google joined Andersen.

A second panel, moderated by Paul Roberts, founder and editor-in-chief, Security Ledger,
looked at the newest and best ways to implement the TPM. He was joined by Paul England, Software Architect, Microsoft Corporation and examined new tools in Windows 10 and by Matthew Garrett, Principal Security Software Engineer, CoreOS.

The third panel moderated by Derek Harp, Director for ICS Global Programs at SANS, focused on securing the connection and  included Steve Venema, senior architect of Polyverse Corporation, and Tony Sager, Senior Vice-President and Chief Evangelist, Center for Internet Security. The group looked at the issues related to connecting IoT devices and
securing legacy and new network connections.

Monty Wiseman, Intel Corporation, hosted an “ask the expert” on the #TPM, associated software and how to implement it.

TCG offered a limited number of the new book ,“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”,
from Apress and TCG members from IBM, Intel and Johns Hopkins University Applied Physics Laboratory were at the event.

Follow TCG on Twitter!
https://twitter.com/TrustedComputin

Seminar Agenda:
[fusion_text]

Time Topic Confirmed Speaker
8:30 AM Welcome/Introduction to SessionDemos open in adjacent room Mark Schiller, TCG Executive Director
8:40-9:15 AM Keynote: Trust-Based Security for Multi-Dimensional Clouds Doug Cahill, Senior Analyst for Cybersecurity, Enterprise Strategy Group (ESG)
9:15-10:00 AM Panel 1: IoT, Trust and Security Moderator: Darin Andersen, CEO and President, CyberTrust
Panelists: Lee Wilson, Product Development Engineer, Security Innovation, Max Senges, Product Manager, Google
10:00-10:10 AM Update from TCG and Demo Highlights Mark Schiller, TCG Executive Director
10:10-10:55 AM Panel 2: Things to Do with the TPM Moderator: Paul Roberts, Editor and Chief, Security Ledger
Panelists: Paul England, Software Architect, Microsoft Corporation, Matthew Garrett, Principal Security Software Engineer, Core OS
10:55-11:05 AM Break
11:05-11:50 AM Panel 3: Network Security in the IoT Moderator: Derek Harp,Director ICS Global Programs, SANS
Panelists: Steve Venema, Senior Security Architect, Polyverse, Tony Sager, Senior VP and Chief Evangelist, Center for Internet Security
11:50-12:00 PM End of Seminar – Live Raffle Drawing for Prizes
12:00-12:30 PM Demonstration Showcase

Demonstration Showcase Participants:
[fusion_text]

Participant Topic
 Anvaya logo Think Outside the Box – Secure Your TLS!!
Aruba  NAC and Endpoint Defense for a Mobile Workforce
Cisco LogoHSR LogInfineon logo Securing IoT with Trusted Computing
CoSoSys Data Loss Prevention in Mixed Environments – Windows, Mac and Linux
Dell Logo Enabling Mission-Critical IoT Applications with a Dell Edge Gateway
 Bright Plaza, Inc. Open Source Management Software for SEDs
 Fraunhofer SIT Logo Advanced Firmware Upgrade Schemes Using TPM 2.0 Enhanced Authorization Policies
 Fujitsu Logo Secure Remote Maintenance for ECUs in a Car Using TPM
 Huawei Logo        Infineon logo Huawei and Infineon Secure the IoT with TPM
 Infineon logo    Wibu System IP Protection and Flexible Licensing Applied to TPM Connected Devices
 Infineon logo   GlobalSign nv-sa Scalable Strong Device Identity through Provisioning and Operation
Intel CorporationLANDesk  Remote Secure Erase
Intel Corporation Trustworthy IoT Gateway
Intel Corporation TPM 2.0 Family Enabling for Linux
Intel Corporation Effective TPM 2.0 via Android and Representational State Transfer (RESTful) Architecture
Intel Corporation Trusting IoT Devices Using Remote Device Attestation
JW Secure, Inc. JW Secure StrongNet Secure Admin
 Micron Logo SEDs: From the Notebook to the Server
Microsoft Logo Enterprise Ready IoT Devices
 Microsoft Logo Health Attestation for Windows Systems
 Pulse Secure Logo Intelligent Endpoint Compliance
  Pulse Secure Logo  Simplify Secure Access
 Tempered Network Logo “Cloaking” is the New Perimeter
winmagic data security logo SEDs in the IoT

 Official Media Partners:
Embedded ComputingSecurity Ledger logo

 

 

 

 

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.