TCG Announces RSA Conference 2016 Session Focus on Securing the Internet of Things

Date Published: December, 01, 2015

Experts to Address the Untrusted IoT and How to Secure It with Available Industry Standards and Solutions

PORTLAND, Ore., Dec. 10, 2015Trusted Computing Group (TCG) today announced speakers and topics for a session “Securing the IoT with Trusted Computing” on Monday, February 29 at the RSA Conference 2016, San Francisco (#RSAC).

The 8:30 a.m. – 12:30 p.m. event in Moscone West 2002 will include a short update on the evolution of trusted computing and the Internet of Things, three panels with industry experts from around the IoT and security and many demonstrations of trusted computing applied to today’s IoT and enterprise security challenges.

Mark Schiller, TCG executive director, will offer attendees a brief look at the role of trusted computing in securing not only traditional enterprise devices, networks and data but also the increasingly complex IoT infrastructure. Darin Andersen, chairman and founder of CyberTECH, then will moderate a panel on using trust and standards for securing the currently vulnerable machine-to-machine IoT with experts from several industries.

A second panel, moderated by Paul Roberts, founder and editor-in-chief, SecurityLedger, will look at the newest and best ways to implement the TPM. He will be joined by Paul England, software architect, Microsoft Corporation to examine new tools in Windows 10 and Windows Server with other experts and by director product management, security services, Andrew Cathrow of VeriSign.

Data breach and security expert Larry Ponemon, chairman and founder, Ponemon Institute will lead a third panel on securing the connection and will be joined by Doug Cahill, senior analyst, ESG and Steve Venema, senior architect of Polyverse Corporation, for a look at the issues related to connecting IoT devices and securing legacy and new network connections.

Attendees can see a number of applications of TCG standards and technologies in IoT use cases, including the TPM, Trusted Network Communications protocols and self-encrypting drives, in action at the session.

The TCG session is open to all registrants, including those with Expo passes, of the RSA Conference. Complementary Expo passes using the code 16UTCGXPO currently are available here.

About TCG

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available on the TCG website. Follow TCG on Twitter and on LinkedIn.

Tweet this: Join @TrustedComputin #RSAC Feb 29 free session on #IoT security, demos, how to use #TPM, more http://ow.ly/VFE2d

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More