Hi [[ session.user.profile.firstName ]]

Trusted Computing Group

  • Date
  • Rating
  • Views
  • How to Secure Network Equipment Against Attacks
    How to Secure Network Equipment Against Attacks
    Steve Hanna, Infineon Recorded: May 16 2018 55 mins
    Much effort has been put into securing data at rest and in transit. But what about the network equipment at the heart of today’s connected enterprises and the huge Internet of Things? Routers, switches and firewalls remain vulnerable to attacks that can compromise these devices.

    In a webcast Wed., May 16, 1:00 p.m. Eastern/10:00 a.m. Pacific, join TCG experts Steve Hanna, Senior Principal, Infineon Technologies, Bill Sulzen,Technical Leader, Cisco Systems, Inc., and Michael Eckel, Security Engineer, Huawei Technologies for a tutorial on how to secure network equipment.

    The webcast will outline key vulnerabilities and specific steps to embed network equipment with foundational security, based on a root of trust. Steve Hanna will advise attendees on key requirements and considerations for designing more secure routers, switches and firewalls and what they need to harden them against attacks, including malware.
  • How to Implement Trusted Platforms and EcoSystems
    How to Implement Trusted Platforms and EcoSystems
    Phil Tricca, Intel, and Lee Wilson, OnBoard Security Recorded: Feb 15 2018 56 mins
    Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, and Philip Tricca, Intel Corporation, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

    Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

    Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security's TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security's post-quantum cryptography (NTRU and pqNTRUsign).

    Prior to joining OnBoard Security, Lee had a 35 year career with IBM. He currently chairs the Trusted Software Stack and Virtualized Platform Work Groups for Trusted Computing Group. Lee earned his BSEE work at Northwestern University and his MSEE work at Syracuse University and has been awarded TCG’s Key Contributor Award.

    Tricca is a software architect and engineer working in Intel’s platform security division. His career began with a 7-year stint in a U.S. Air Force research lab working with open source Linux security technology including mandatory access control systems like SELinux and measured boot using the TPM 1.2 devices. Most recently Philip has found his way to Intel where his current responsibilities include transforming Intel’s open source implementation of the TPM2 Software Stack (TSS2) from proof of concept to a vibrant and sustainable OSS project.
  • Securing Network Equipment with Trust and Integrity
    Securing Network Equipment with Trust and Integrity
    Steve Hanna, Senior Principal at Infineon Technologies and Michael Eckel, Security Technologist at Huawei Technologies Recorded: Jul 25 2017 57 mins
    Interconnected networks are critical to the operation of a broad and growing range of devices and services, from computers and phones to industrial systems and critical infrastructure.

    The integrity and security of routers, switches, and firewalls is essential to network reliability, as well as to the integrity and privacy of data on these networks. As increasingly sophisticated attacks are launched on network equipment, strong protection mechanisms for network equipment, both on the device and service level, is required.

    TCG recently has issued its Guidance for Securing Network Equipment with use-cases and implementation approaches to solve these problems, designed to help system designers and network architects get the best security possible from this powerful technology.
    Join TCG experts to learn about using device identity, securing secrets, protecting configuration data, inventorying software, conducting health checks, using licensed feature authorization and more.


    Steve Hanna, Senior Principal at Infineon Technologies, currently chairs TCG’s Embedded Systems and IoT groups and driving the effort for a new industrial IoT group within the organization. He has been active in the Industrial Internet Consortium and its security efforts as well. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 41 issued U.S. patents; and holds a Bachelor’s degree in Computer Science from Harvard University.

    Michael Eckel is a Security Technologist at Huawei Technologies. Previously, he was a researcher and software developer at Fraunhofer SIT; mobile software developer at boostix and a web and software developer for a number of other companies. He holds a masters degree in computer science. Eckel currently participates in the Trusted Computing Group’s NetEQ subgroup, working to secure vulnerable network equipment.
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia Recorded: Apr 24 2017 60 mins
    Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • How to Use the Trusted Platform Module (TPM) for Trust and Security
    How to Use the Trusted Platform Module (TPM) for Trust and Security
    Monty Wiseman, General Electric Company, and Lee Wilson, Security Innovation Recorded: Jan 31 2017 62 mins
    The rush to connect ever more devices with sensitive data and often insecure connections has created an exponential increase in associated security issues. Every day brings new reports of attacks, hacks, malware and data breaches. Fortunately, there are some widely vetted ways to help prevent many of these incidents: the TPM, or Trusted Platform Module, which can be implemented now in a number of ways.

    This webcast, with TCG TPM experts Lee Wilson, Security Innovation and Monty Wiseman, GE, will review basic trust concepts, key TPM attributes and functions, the new library specification including newly added features, and how the TPM is used in specific applications. The implementation of the TPM in mobile, embedded and IoT devices will be addressed.

    The session also will include a Q&A with attendees, so come prepared with your TPM questions.
  • Save the Data: How to Protect Data Wherever It Lives
    Save the Data: How to Protect Data Wherever It Lives
    Robert Thibadeau, Drive Trust Alliance Recorded: Nov 16 2016 61 mins
    Data has exploded across devices and anything with memory. No matter where it lives and whatever it is - sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to attacks, theft, hacks, and loss. This webcast, featuring a leading expert on encryption and data protection, will examine just why stored-data is not always protected, the role of encryption across devices and storage systems, and how encryption can satisfy compliance regulations. The webcast will look at were to find secure data devices and how they can be deployed in the enterprise and in the IoT, as well as current and emerging standards to support growing demands and requirements for data protection and encryption.

    Join Trusted Computing Group to learn how to protect data now.
  • Securing IoT Endpoints, Networks and the Cloud
    Securing IoT Endpoints, Networks and the Cloud
    Cisco and GlobalSign Recorded: Sep 20 2016 60 mins
    Using Strong Device Identity, Network Security and Integrity Checks

    Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT security gaps in a number of applications and endpoints.

    Part one of the webcast will examine critical security concerns that an IoT provider needs to address. These include authentication, privacy and integrity. Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international standards-based Trusted Platform Module.

    In part two, TCG experts will look at the example of smart buildings, in which endpoints must be checked for integrity, allowed safely on a network and exchange data with the cloud - all securely and without the introduction of malware or other attacks. In this example, the techniques and technologies can be applied to many endpoints, which will be addressed.

    Attendees will learn key vulnerabilities of IoT endpoints, networks and data and learn how to secure them using widely available tools and technologies.
  • Protecting Intellectual Property in the IoT with Trusted Computing
    Protecting Intellectual Property in the IoT with Trusted Computing
    Steve Hanna of Infineon and Günther Fischer of WIBU Recorded: Jun 7 2016 49 mins
    Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things

    Attackers often use reverse engineering to locate software vulnerabilities that they then
    can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes.

    In IoT and embedded systems, this can lead to serious and dangerous hacks, as recent attacks on safety-critical automotive components have shown. How can developers protect against such attacks?

    This webcast will discuss widely vetted industry standards and solutions to protect software integrity against cyber violations and safeguard the intellectual property. The webcast will provide a brief overview of the TPM and how it is being used to create secured code and licenses. Attendees will learn how these licenses can be bound to a secure element and integrated into existing business processes. Speakers from TCG members Infineon and WIBU also will answer questions about this approach.
  • Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and
    Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and
    Cisco, Infineon,and Intel Recorded: Jun 1 2015 38 mins
    Securing IoT with Trusted Computing demonstration built by Trusted Computing Group member companies Cisco, Infineon, and Intel with the assistance of Applied Sciences, Rapperswil, presented at RSA 2015 during the the TCG Association Seminar and Demonstration Showcase: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions.
  • TCG Technologies for Protecting Internet of Things (IoT) Against Attacks
    TCG Technologies for Protecting Internet of Things (IoT) Against Attacks
    Bill Morelli, IHS Technologies with TCG IoT Co-Chair Steve Hanna, Infineon Technologies. Recorded: Apr 2 2015 58 mins
    Join Trusted Computing Group (TCG) and its experts as we look at how to secure the exploding Internet of Things (IoT) and associated endpoints, networks and data, using widely available and supported existing trusted computing solutions for the IoT.

    This webcast will examine how a huge variety of IoT endpoints, resulting in massive amounts of data, can be secured in a way that is consistent with IoT requirements, including cost, footprint and power consumption. The role of trust, including unique identity and integrity, will be discussed.

    Use cases and examples of implementation ideas will be provided for a variety of applications. The webcast will examine emerging standards and requirements and how industry standards will support them.

Embed in website or blog