TCG: Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions

  • Monday, April 20, 2015 | 9:00 AM – 1:00 PM | West | Room: 2002

View all Sessions

Do I know you, can I trust you? While the concept of trust and its role in security are widely accepted now in enterprise computing, near-revolutionary changes to how we get, use and share data have created entirely new classes of unprotected devices, networks and data. Sensor data, personally identifiable information, financial transactions and health data, and intellectual property fly through a variety of networks, touching a variety of devices, unencrypted and vulnerable to loss, theft and attack. We know now that power grid, manufacturing operations and mobile devices routinely are hacked and attacked. Even as developers create new, ever-more powerful and connected systems, security has not been a key consideration.

This association session hosted by the Trusted Computing Group (TCG) will address these new issues, as well as take a look at the state of security and trust in traditional enterprise computing. Experts on the IoT, mobile security and transactions and embedded systems will throw out the potential worst security cases and talk about possible approaches to cutting these systems off to attacks. The role of trust and industry standards from various groups will be addressed. Examples of trust in enterprise computing also will be addressed with discussions of how the TPM can be used to protect PCs; what role encryption plays in enterprise security; and the growing promise of security automation to automate and manage critical security functions. 

Attendees will also be able to experience new demos on mobile, embedded, IoT and enterprise security for ideas on using available tools and technologies for security, as well as emerging ways to leverage trust.

Agenda Items

  • 9:05 AM – 9:20 AM | Welcome and Introduction to TCG
  • 9:20 AM – 9:45 AM | 20-Story Sandcastle: Why We Need a New Foundation for the Internet of Things
  • 9:45 AM – 10:45 AM | Security and the Root of Trust: Leveraging the Root of Trust and TPM in the Enterprise
  • 11:00 AM – 12:00 PM | The Insecure Internet of Things and How to Secure It
  • 12:00 PM – 1:00 PM | Mobile is King, But Security Must Be a Priority

This document was retrieved from on Tue, 19 Feb 2019 16:00:44 -0500.