Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Remote Platform Integrity Attestation Muthu Ramalingam, Engineering Manager, R&D - Software & Security Engineering, AMI (USA) This presentation will outline the technology concepts underlying platform integrity, one of the foundational standards of trusted computing. It will ... 9 months ago | 52 mins Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Part 1 - Securing the Boot Process When people think about cybersecurity today, they typically think about securing data in motion and at rest or ana... 5 years ago | 40 mins The Cloud Client approach to Device Identity Management Bernard Parsons Overview of a National Cyber Security Centre (NCSC) sponsored project to promote secure collaboration. Features a Device Identity Management platform ... 4 years ago | 10 mins [Part 2] Next Generation Sigma Launch: Secure ID Card Printing Martin Hoff, Product Marketing Manager, Entrust Join us for the second session, in a three-part launch series, for Entrust’s new Sigma ID Issuance Solution. Born in the cloud, it is simple, secure, ... 1 year ago | 57 mins How to Implement Trusted Platforms and EcoSystems Phil Tricca, Intel, and Lee Wilson, OnBoard Security Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the fou... 5 years ago | 56 mins Next Generation Sigma Launch: Secure ID Card Printing Martin Hoff, Product Marketing Manager, Entrust Join us November 18th for the second session, in a three-part launch series, for Entrust’s new Sigma ID Issuance Solution. Born in the cloud, it is si... 2 years ago | 57 mins Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, da... 5 years ago | 46 mins [Part 1] Next Generation Sigma Launch: Simple ID Card Printing Martin Hoff, Product Marketing Manager, Entrust Our new Sigma ID issuance solution is simple, secure, and smart. And together, that adds up to the world’s most advanced ID card printer ever. Simpl... 1 year ago | 57 mins Avoiding the risks of vulnerable endpoints Bob Tarzey, Bernard Parsons An interview with Industry Analyst Bob Tarzey, discussing how a security-focused operating system can help organizations optimize their end user devic... 4 years ago | 28 mins Together We Sink or Swim: Plugging the BootHole J. Michael, Principal Researcher, Eclypsium; D. Kiper, Software Eng., Oracle; C. Coulson, Sr Software Eng., Canonical In modern PC-based platforms, UEFI Secure Boot is used to protect the integrity of the boot process by ensuring that only authorized code is allowed t... 2 years ago | 63 mins