The (ISC)2 Security Congress, September 10-13 in Philadelphia, is co-located with the ASIS International 58th Annual Seminar and Exhibits.
On Monday, Sept. 10, 4:30 – 5:30 p.m. EDT, members of TCG will address current and emerging security threats and solutions in the track “Threats Inside and Out.” Following an overview by TCG Director Brian Berger, Nicolai Kuntze of Fraunhofer Institute for Secure Technology (SIT) will address secure industrial peer-to-peer networks, followed by Jens Lucius, NCP Engineering, on trust in embedded systems. Michael Willett, Samsung, will provide an overview of self-encrypting drives (SEDs), while Steve Hanna, Juniper Networks, will address solutions for securing BYOD.
TCG members also will show trusted computing solutions in Booth #457.
- CMS Products will show management of self-encrypting drives (SEDs) based on TCG’s specifications.
- Fraunhofer SIT and NCP will show how embedded systems can be enabled for trust, based on the TCG TPM and the IF-MAP protocol.
- Fraunhofer SIT also will demonstrate security enabled via TPM-based attestation on mobile ad-hoc networks, which can be susceptible to attack vectors at multiple levels.
- General Dynamics C4 Systems will demonstrate an integrated, off-the-shelf solution for authentication and authorizing endpoints and users, based on the TCG TPM and the IF-MAP protocol.
- Hirsch Identive will show how organizations can securely share physical access control systems information with other trusted systems and applications, using the TCG IF-MAP protocol.
- Juniper Networks will demonstrate Comply to Connect, based on the Trusted Network Connect standards, to verify the security of endpoints connecting to the network.
- Wave Systems will demonstrate how TPMs can be provisioned to verify machine health, provide access control and enable strong authentication. Set-up, recovery and management of SEDs also will be shown.
The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and LinkedIn.
Tweet this: Trusted Computing Group, #CMS #Juniper #Wave #Fraunhofer #NCP #GDC4s #Hirsch show TPM, SEDs IF-MAP at ASIS Conf http://bit.ly/S2bYrz
Brands and trademarks are the property of their respective owners.