TPMs Can't Be Hacked - Cybersecurity Mythbusters

Logo
Presented by

Patrick McBride and Jasson Casey at Beyond Identity

About this talk

A TPM (or Trusted Platform Module) is an industry standard component that protects keys that can be used for authentication. The important property of TPMs is that the private key is protected from even the lowest level of the operating system. This property protects a TPM key from phishing and other attacks that may expose it. It is available on most PCs, networking equipment, and industrial controllers. But can a TPM be hacked? Our Security Architect, Monty Wiseman is with us to help us find out! Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they try to bust this latest myth! Follow Beyond Identity: twitter.com/beyondidentity linkedin.com/company/beyond-identity-inc Website: beyondidentity.com
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (27)
Subscribers (930)
Zero Trust Authentication protecting your workforce, customers, and developers with passwordless, phishing-resistant MFA! www.beyondidentity.com