Hi [[ session.user.profile.firstName ]]

Trusted Computing Group

  • Date
  • Rating
  • Views
  • How to Use the Trusted Platform Module (TPM) for Trust and Security
    How to Use the Trusted Platform Module (TPM) for Trust and Security Monty Wiseman, General Electric Company, and Lee Wilson, Security Innovation Recorded: Jan 31 2017 62 mins
    The rush to connect ever more devices with sensitive data and often insecure connections has created an exponential increase in associated security issues. Every day brings new reports of attacks, hacks, malware and data breaches. Fortunately, there are some widely vetted ways to help prevent many of these incidents: the TPM, or Trusted Platform Module, which can be implemented now in a number of ways.

    This webcast, with TCG TPM experts Lee Wilson, Security Innovation and Monty Wiseman, GE, will review basic trust concepts, key TPM attributes and functions, the new library specification including newly added features, and how the TPM is used in specific applications. The implementation of the TPM in mobile, embedded and IoT devices will be addressed.

    The session also will include a Q&A with attendees, so come prepared with your TPM questions.
  • Save the Data: How to Protect Data Wherever It Lives
    Save the Data: How to Protect Data Wherever It Lives Robert Thibadeau, Drive Trust Alliance Recorded: Nov 16 2016 61 mins
    Data has exploded across devices and anything with memory. No matter where it lives and whatever it is - sensitive personal, medical, financial, business data, photos and music – all such data is highly vulnerable, In fact, breaches occur daily and the growing number of interconnected “things” means that even more data is open to attacks, theft, hacks, and loss. This webcast, featuring a leading expert on encryption and data protection, will examine just why stored-data is not always protected, the role of encryption across devices and storage systems, and how encryption can satisfy compliance regulations. The webcast will look at were to find secure data devices and how they can be deployed in the enterprise and in the IoT, as well as current and emerging standards to support growing demands and requirements for data protection and encryption.

    Join Trusted Computing Group to learn how to protect data now.
  • Securing IoT Endpoints, Networks and the Cloud
    Securing IoT Endpoints, Networks and the Cloud Cisco and GlobalSign Recorded: Sep 20 2016 60 mins
    Using Strong Device Identity, Network Security and Integrity Checks

    Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT security gaps in a number of applications and endpoints.

    Part one of the webcast will examine critical security concerns that an IoT provider needs to address. These include authentication, privacy and integrity. Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international standards-based Trusted Platform Module.

    In part two, TCG experts will look at the example of smart buildings, in which endpoints must be checked for integrity, allowed safely on a network and exchange data with the cloud - all securely and without the introduction of malware or other attacks. In this example, the techniques and technologies can be applied to many endpoints, which will be addressed.

    Attendees will learn key vulnerabilities of IoT endpoints, networks and data and learn how to secure them using widely available tools and technologies.
  • Protecting Intellectual Property in the IoT with Trusted Computing
    Protecting Intellectual Property in the IoT with Trusted Computing Steve Hanna of Infineon and Günther Fischer of WIBU Recorded: Jun 7 2016 49 mins
    Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things

    Attackers often use reverse engineering to locate software vulnerabilities that they then
    can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes.

    In IoT and embedded systems, this can lead to serious and dangerous hacks, as recent attacks on safety-critical automotive components have shown. How can developers protect against such attacks?

    This webcast will discuss widely vetted industry standards and solutions to protect software integrity against cyber violations and safeguard the intellectual property. The webcast will provide a brief overview of the TPM and how it is being used to create secured code and licenses. Attendees will learn how these licenses can be bound to a secure element and integrated into existing business processes. Speakers from TCG members Infineon and WIBU also will answer questions about this approach.
  • Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and
    Securing IoT with Trusted Computing Demonstration Video by Cisco, Infineon, and Cisco, Infineon,and Intel Recorded: Jun 1 2015 38 mins
    Securing IoT with Trusted Computing demonstration built by Trusted Computing Group member companies Cisco, Infineon, and Intel with the assistance of Applied Sciences, Rapperswil, presented at RSA 2015 during the the TCG Association Seminar and Demonstration Showcase: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions.
  • TCG Technologies for Protecting Internet of Things (IoT) Against Attacks
    TCG Technologies for Protecting Internet of Things (IoT) Against Attacks Bill Morelli, IHS Technologies with TCG IoT Co-Chair Steve Hanna, Infineon Technologies. Recorded: Apr 2 2015 58 mins
    Join Trusted Computing Group (TCG) and its experts as we look at how to secure the exploding Internet of Things (IoT) and associated endpoints, networks and data, using widely available and supported existing trusted computing solutions for the IoT.

    This webcast will examine how a huge variety of IoT endpoints, resulting in massive amounts of data, can be secured in a way that is consistent with IoT requirements, including cost, footprint and power consumption. The role of trust, including unique identity and integrity, will be discussed.

    Use cases and examples of implementation ideas will be provided for a variety of applications. The webcast will examine emerging standards and requirements and how industry standards will support them.
  • Industrial Control System (ICS) Security Using TNC Technology Webcast
    Industrial Control System (ICS) Security Using TNC Technology Webcast Steve Venema (Boeing), Eric Byres (Belden), David Mattes (Asguard Networks), Lisa Lorenzin (Juniper) Recorded: Sep 18 2014 61 mins
    Industrial control systems represent one of the largest and potentially damaging attack surfaces in our now-interconnected world. Although gains have been made with awareness of security for ICS and SCADA networks, solutions are still emerging. TCG, with other groups, has been working to develop standards that will enable comprehensive ICS security building on existing standards and for both existing and future industrial network architectures.

    This webcast will address the need for a distributed network approach to ICS security and how TCG standards, complementing those developed by ISA/IEC, can implement the deployment, management and protection of large-scale ICS. The approach is based on a virtual overlay network that tops a standard Internet Protocol network infrastructure.

    Experts from The Boeing Corporation, Asguard Networks and Tofino Security/Belden will address the key concepts of the overlay network, the status of standards for implementation and key strategies for ICS network architects and security professionals.

    Attendees learn how to evaluate and use these standards and critical steps for secure ICS networks.
  • Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises
    Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises Michael Willett (Samsung Electronics), Andy Avery (Wave Systems), and Darren Leroux (WinMagic) Recorded: Jul 16 2014 52 mins
    Data breaches continue to cost businesses big money - and not just legal costs, fines and lost business. The huge, recent Target incident has proven that a large breach can impact the stock price and ongoing trade over time and endanger the careers of the C-level executives at the helm.

    So, despite available technologies, data continues to be lost. Sometimes it’s a matter of the lost laptop with Social Security numbers or other personally identifiable information. In other cases, we ‘re talking about racks of drives being lost to carefully planned theft, or loads of critical info left on drives that were disposed of improperly.

    But there ARE solutions - solutions that now are widely available, easy to implement and basically foolproof. For many instances of data breach, this solution is the self-encrypting drive, or SED. These drives, based on industries standards developed by TCG and implemented by almost all storage vendors, provide instant, on-the-fly, transparent encryption. Users cannot turn it off, and it does not impact system performance. SEDs are available as traditional hard disk drives, in enterprise and client SSDs and in enterprise-class storage solutions for data centers.

    Join experts from Samsung, Seagate and WinMagic as we look at the key concepts of SEDs, performance and implementation and the role of SEDs in enterprise data protection. See how companies are using them and tips for a successful deployment that can protect data all the time and allow for the instant erasure or re-purposing of drives easily and effectively.
  • Using the TPM to Solve Today’s Most Urgent Cybersecurity Problems Webcast
    Using the TPM to Solve Today’s Most Urgent Cybersecurity Problems Webcast Stacy Cannady, CISSP (Cisco) and Monty Wiseman, Security Architect (Intel) Recorded: May 20 2014 63 mins
    With the recent discovery of the flaw in OpenSSL, Heartbleed, even the least computer-savvy among us has seen the potential threat and damage caused by cybersecurity problems. And Heartbleed is just one of many attacks, breaches, viruses, and more that just keep coming. With IT and security pros under siege and various vendors emerging with a dizzying array of potential solutions, how can enterprise users best protect against and mitigate many security issues?

    This webinar will address a fundamental and key aspect to IT security: the root of trust. Embedded into devices, whether PCs, servers, networking gear, mobile platforms or embedded systems of any kind, the root of trust, typically implemented by the Trusted Platform Module (TPM), provides a proven, safe foundation for more secure computing. Learn the key concepts of trusted systems, why they’re critical to establishing security and supporting other solutions and what is new with the TPM. Speakers with extensive experience implementing and developing the TPM will address its use and what to expect with emerging platforms.
  • Industrial Control System (ICS) Security Using TNC Technology Webcast
    Industrial Control System (ICS) Security Using TNC Technology Webcast Eric Bynes (Tofino Security), Lisa Lorenzin (Juniper Networks), David Mattes ( Asguard Networks) Recorded: Nov 19 2013 43 mins
    Industrial Control Systems (ICSs) are increasingly being connected to the internet and exposed to viruses, malware and attacks that affect other network-connected systems. As a result, many standards organizations including the International Society of Automation America (ISA), International Electrotechnical Commission (IEC) and the Trusted Computing Group (TCG) in cooperation with Internet Engineering Task Force (IETF), The Open Group and others) are developing standards-based approaches for increased control system security.
    TCG standards developed by the Trusted Network Connect (TNC) workgroup (See Sidebar) can be implemented today to provide increased security and protection from unauthorized ICS access. These standards help implement the security defined in ISA/IEC specifications. Specifically, the Interface for a Metadata Access Point (IF-MAP) Metadata for ICS Security specification facilitates the deployment, management, and protection of large-scale industrial control systems by creating virtual overlay networks on top of standard shared internet protocol (IP) network infrastructure.
    In the webcast, ICS experts Eric Byres, CTO for Tofino Security, Belden, and David Mattes, founder and CEO, Asguard Networks, will discuss these standards and how IT and control system executives and architects can implement a standards-based, interoperable approach to ICS security. Attendees will learn critical strategies, steps to success and how one major aviation company has set up its ICS security using the basic standards-based approach.
    Join us on Tues. Nov. 19th, 10 a.m. Pacific/1 p.m. East for this exciting look at securing our critical infrastructure.

Embed in website or blog