How to Secure Network Equipment Against Attacks

Presented by

Steve Hanna, Infineon

About this talk

Much effort has been put into securing data at rest and in transit. But what about the network equipment at the heart of today’s connected enterprises and the huge Internet of Things? Routers, switches and firewalls remain vulnerable to attacks that can compromise these devices. In a webcast Wed., May 16, 1:00 p.m. Eastern/10:00 a.m. Pacific, join TCG experts Steve Hanna, Senior Principal, Infineon Technologies, Bill Sulzen,Technical Leader, Cisco Systems, Inc., and Michael Eckel, Security Engineer, Huawei Technologies for a tutorial on how to secure network equipment. The webcast will outline key vulnerabilities and specific steps to embed network equipment with foundational security, based on a root of trust. Steve Hanna will advise attendees on key requirements and considerations for designing more secure routers, switches and firewalls and what they need to harden them against attacks, including malware.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (3460)
The Trusted Computing Group (TCG) is incorporated as a not-for-profit industry standards organization focused on developing, defining, and promoting open standards for trusted computing that will benefit users. The organization's structure has been designed to enable broad participation, efficient management, and widespread adoption of the organization's specifications.