Welcome!

Web 2.0 Authors: Kevin Benedict

News Feed Item

Trusted Computing Group (TCG) to Host RSA 2013 Session with Leading Security Analysts

Trusted Computing Group (TCG) will host its annual security workshop session, Trusted Computing: Billions of Secure Endpoints in 10 Years, at RSA 2013 in San Francisco on Monday, Feb. 25, 10 a.m. – 2 p.m. The session is open to RSA attendees registered for the conference or expo.

TCG will celebrate its 10th anniversary at RSA Conference 2013 with a look at current and emerging applications for trusted systems. In the decade since its first specifications, Trusted Computing has become widely supported by the computing industry, governments and users worldwide.

The workshop will offer a series of panel sessions as well as discussion about Trusted Computing applications and a keynote.

One of the industry's most thoughtful analysts on malware, advanced persistent threats and other security challenges, Charles Kolodgy, IDC, will address today's and tomorrow's threats and lead a panel of users and technologists on the pros and cons of various solutions.

Phil Schacter, Managing Vice President, Security and Risk Management, Gartner for Technical Professionals, will lead a panel on network security trends from an industry perspective, featuring BYOD and other big industry issues. Schacter is known for his work in network security, security architecture, security governance, network identity and policy systems and remote work infrastructure.

Enterprise security expert Eric Ogren, Ogren Group, will lead a third session focused on data protection. Ogren has worked with a number of security vendors as well as provided clients with sound advice on their security infrastructure.

The TCG session also will include demonstrations of TCG technologies, including SEDs for data protection, network security and multi-factor authentication and assurance. Today, more than a billion endpoints deploy Trusted Computing specifications.

The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Tweet this: #RSA2013 session by TCG led by #IDC, #Gartner, #Ogren re info assurance, cybersecurity. http://bit.ly/10PHESD

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.