Posted on
in Presentations
Discuss the TPM hardware and software enabling challenges for a standards-based root of trust for Industrial Controllers. Discuss the hardware options (e.g., discrete, virtual) for implementing a TPM and the various tools available to software. Extending concepts from Session TECH-F03 to using the TPM’s capability to protect information to and from devices and enhancing existing and new protocols. Attendance is strictly limited to allow for a small group experience.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community