Hi [[ session.user.profile.firstName ]]

Trusted Computing Group

  • Date
  • Rating
  • Views
  • Securing Network Equipment with Trust and Integrity
    Securing Network Equipment with Trust and Integrity Steve Hanna, Senior Principal at Infineon Technologies and Michael Eckel, Security Technologist at Huawei Technologies Recorded: Jul 25 2017 57 mins
    Interconnected networks are critical to the operation of a broad and growing range of devices and services, from computers and phones to industrial systems and critical infrastructure.

    The integrity and security of routers, switches, and firewalls is essential to network reliability, as well as to the integrity and privacy of data on these networks. As increasingly sophisticated attacks are launched on network equipment, strong protection mechanisms for network equipment, both on the device and service level, is required.

    TCG recently has issued its Guidance for Securing Network Equipment with use-cases and implementation approaches to solve these problems, designed to help system designers and network architects get the best security possible from this powerful technology.
    Join TCG experts to learn about using device identity, securing secrets, protecting configuration data, inventorying software, conducting health checks, using licensed feature authorization and more.


    Steve Hanna, Senior Principal at Infineon Technologies, currently chairs TCG’s Embedded Systems and IoT groups and driving the effort for a new industrial IoT group within the organization. He has been active in the Industrial Internet Consortium and its security efforts as well. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 41 issued U.S. patents; and holds a Bachelor’s degree in Computer Science from Harvard University.

    Michael Eckel is a Security Technologist at Huawei Technologies. Previously, he was a researcher and software developer at Fraunhofer SIT; mobile software developer at boostix and a web and software developer for a number of other companies. He holds a masters degree in computer science. Eckel currently participates in the Trusted Computing Group’s NetEQ subgroup, working to secure vulnerable network equipment.
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia Recorded: Apr 24 2017 60 mins
    Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • How to Use the Trusted Platform Module (TPM) for Trust and Security
    How to Use the Trusted Platform Module (TPM) for Trust and Security Monty Wiseman, General Electric Company, and Lee Wilson, Security Innovation Recorded: Jan 31 2017 62 mins
    The rush to connect ever more devices with sensitive data and often insecure connections has created an exponential increase in associated security issues. Every day brings new reports of attacks, hacks, malware and data breaches. Fortunately, there are some widely vetted ways to help prevent many of these incidents: the TPM, or Trusted Platform Module, which can be implemented now in a number of ways.

    This webcast, with TCG TPM experts Lee Wilson, Security Innovation and Monty Wiseman, GE, will review basic trust concepts, key TPM attributes and functions, the new library specification including newly added features, and how the TPM is used in specific applications. The implementation of the TPM in mobile, embedded and IoT devices will be addressed.

    The session also will include a Q&A with attendees, so come prepared with your TPM questions.
  • Save the Data: How to Protect Data Wherever It Lives
    Save the Data: How to Protect Data Wherever It Lives Robert Thibadeau, Drive Trust Alliance Recorded: Nov 16 2016 61 mins
    Data has exploded across devices and anything with memory. No matter where it lives and whatever it is - sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to attacks, theft, hacks, and loss. This webcast, featuring a leading expert on encryption and data protection, will examine just why stored-data is not always protected, the role of encryption across devices and storage systems, and how encryption can satisfy compliance regulations. The webcast will look at were to find secure data devices and how they can be deployed in the enterprise and in the IoT, as well as current and emerging standards to support growing demands and requirements for data protection and encryption.

    Join Trusted Computing Group to learn how to protect data now.
  • Securing IoT Endpoints, Networks and the Cloud
    Securing IoT Endpoints, Networks and the Cloud Cisco and GlobalSign Recorded: Sep 20 2016 60 mins
    Using Strong Device Identity, Network Security and Integrity Checks

    Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT security gaps in a number of applications and endpoints.

    Part one of the webcast will examine critical security concerns that an IoT provider needs to address. These include authentication, privacy and integrity. Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international standards-based Trusted Platform Module.

    In part two, TCG experts will look at the example of smart buildings, in which endpoints must be checked for integrity, allowed safely on a network and exchange data with the cloud - all securely and without the introduction of malware or other attacks. In this example, the techniques and technologies can be applied to many endpoints, which will be addressed.

    Attendees will learn key vulnerabilities of IoT endpoints, networks and data and learn how to secure them using widely available tools and technologies.
  • Protecting Intellectual Property in the IoT with Trusted Computing
    Protecting Intellectual Property in the IoT with Trusted Computing Steve Hanna of Infineon and Günther Fischer of WIBU Recorded: Jun 7 2016 49 mins
    Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things

    Attackers often use reverse engineering to locate software vulnerabilities that they then
    can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes.

    In IoT and embedded systems, this can lead to serious and dangerous hacks, as recent attacks on safety-critical automotive components have shown. How can developers protect against such attacks?

    This webcast will discuss widely vetted industry standards and solutions to protect software integrity against cyber violations and safeguard the intellectual property. The webcast will provide a brief overview of the TPM and how it is being used to create secured code and licenses. Attendees will learn how these licenses can be bound to a secure element and integrated into existing business processes. Speakers from TCG members Infineon and WIBU also will answer questions about this approach.
  • Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and
    Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and Cisco, Infineon,and Intel Recorded: Jun 1 2015 38 mins
    Securing IoT with Trusted Computing demonstration built by Trusted Computing Group member companies Cisco, Infineon, and Intel with the assistance of Applied Sciences, Rapperswil, presented at RSA 2015 during the the TCG Association Seminar and Demonstration Showcase: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions.
  • TCG Technologies for Protecting Internet of Things (IoT) Against Attacks
    TCG Technologies for Protecting Internet of Things (IoT) Against Attacks Bill Morelli, IHS Technologies with TCG IoT Co-Chair Steve Hanna, Infineon Technologies. Recorded: Apr 2 2015 58 mins
    Join Trusted Computing Group (TCG) and its experts as we look at how to secure the exploding Internet of Things (IoT) and associated endpoints, networks and data, using widely available and supported existing trusted computing solutions for the IoT.

    This webcast will examine how a huge variety of IoT endpoints, resulting in massive amounts of data, can be secured in a way that is consistent with IoT requirements, including cost, footprint and power consumption. The role of trust, including unique identity and integrity, will be discussed.

    Use cases and examples of implementation ideas will be provided for a variety of applications. The webcast will examine emerging standards and requirements and how industry standards will support them.
  • Industrial Control System (ICS) Security Using TNC Technology Webcast
    Industrial Control System (ICS) Security Using TNC Technology Webcast Steve Venema (Boeing), Eric Byres (Belden), David Mattes (Asguard Networks), Lisa Lorenzin (Juniper) Recorded: Sep 18 2014 61 mins
    Industrial control systems represent one of the largest and potentially damaging attack surfaces in our now-interconnected world. Although gains have been made with awareness of security for ICS and SCADA networks, solutions are still emerging. TCG, with other groups, has been working to develop standards that will enable comprehensive ICS security building on existing standards and for both existing and future industrial network architectures.

    This webcast will address the need for a distributed network approach to ICS security and how TCG standards, complementing those developed by ISA/IEC, can implement the deployment, management and protection of large-scale ICS. The approach is based on a virtual overlay network that tops a standard Internet Protocol network infrastructure.

    Experts from The Boeing Corporation, Asguard Networks and Tofino Security/Belden will address the key concepts of the overlay network, the status of standards for implementation and key strategies for ICS network architects and security professionals.

    Attendees learn how to evaluate and use these standards and critical steps for secure ICS networks.
  • Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises
    Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises Michael Willett (Samsung Electronics), Andy Avery (Wave Systems), and Darren Leroux (WinMagic) Recorded: Jul 16 2014 52 mins
    Data breaches continue to cost businesses big money - and not just legal costs, fines and lost business. The huge, recent Target incident has proven that a large breach can impact the stock price and ongoing trade over time and endanger the careers of the C-level executives at the helm.

    So, despite available technologies, data continues to be lost. Sometimes it’s a matter of the lost laptop with Social Security numbers or other personally identifiable information. In other cases, we ‘re talking about racks of drives being lost to carefully planned theft, or loads of critical info left on drives that were disposed of improperly.

    But there ARE solutions - solutions that now are widely available, easy to implement and basically foolproof. For many instances of data breach, this solution is the self-encrypting drive, or SED. These drives, based on industries standards developed by TCG and implemented by almost all storage vendors, provide instant, on-the-fly, transparent encryption. Users cannot turn it off, and it does not impact system performance. SEDs are available as traditional hard disk drives, in enterprise and client SSDs and in enterprise-class storage solutions for data centers.

    Join experts from Samsung, Seagate and WinMagic as we look at the key concepts of SEDs, performance and implementation and the role of SEDs in enterprise data protection. See how companies are using them and tips for a successful deployment that can protect data all the time and allow for the instant erasure or re-purposing of drives easily and effectively.

Embed in website or blog