How to Use the Trusted Platform Module (TPM) for Trust and Security

Presented by

Monty Wiseman, General Electric Company, and Lee Wilson, Security Innovation

About this talk

The rush to connect ever more devices with sensitive data and often insecure connections has created an exponential increase in associated security issues. Every day brings new reports of attacks, hacks, malware and data breaches. Fortunately, there are some widely vetted ways to help prevent many of these incidents: the TPM, or Trusted Platform Module, which can be implemented now in a number of ways. This webcast, with TCG TPM experts Lee Wilson, Security Innovation and Monty Wiseman, GE, will review basic trust concepts, key TPM attributes and functions, the new library specification including newly added features, and how the TPM is used in specific applications. The implementation of the TPM in mobile, embedded and IoT devices will be addressed. The session also will include a Q&A with attendees, so come prepared with your TPM questions.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (19)
Subscribers (3350)
The Trusted Computing Group (TCG) is incorporated as a not-for-profit industry standards organization focused on developing, defining, and promoting open standards for trusted computing that will benefit users. The organization's structure has been designed to enable broad participation, efficient management, and widespread adoption of the organization's specifications.