How Govt and Private Industry Can Work Together to Strengthen Human and Device Identity Management


Posted on in Presentations

Discuss the TPM hardware and software enabling challenges for a standards-based root of trust for Industrial Controllers. Discuss the hardware options (e.g., discrete, virtual) for implementing a TPM and the various tools available to software. Extending concepts from Session TECH-F03 to using the TPM’s capability to protect information to and from devices and enhancing existing and new protocols. Attendance is strictly limited to allow for a small group experience.



Join the RSAC Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC Conference presentations. Learn more.

Participants
Monty Wiseman

Participant

Principal Engineer, Cybersecurity, GE Research


Share With Your Community