|[November 28, 2012]
Trusted Computing Group (TCG) to Host RSA 2013 Session with Leading Security Analysts
PORTLAND, Ore. --(Business Wire)--
Computing Group (TCG) will host its annual security workshop
Computing: Billions of Secure Endpoints in 10 Years, at RSA
2013 in San Francisco on Monday, Feb. 25, 10 a.m. - 2 p.m. The
session is open to RSA (News - Alert) attendees registered for the conference or expo.
TCG will celebrate its 10th anniversary at RSA Conference 2013 with a
look at current and emerging applications for trusted systems. In the
decade since its first specifications, Trusted Computing has become
widely supported by the computing industry, governments and users
The workshop will offer a series of panel sessions as well as discussion
about Trusted Computing applications and a keynote.
One of the industry's most thoughtful analysts on malware, advanced
persistent threats and other security challenges, Charles
Kolodgy, IDC (News - Alert), will address today's and tomorrow's threats and lead a
panel of users and technologists on the pros and cons of various
Schacter, Managing Vice President, Security and Risk Management,
Gartner (News - Alert) for Technical Professionals, will lead a panel on network
security trends from an industry perspective, featuring BYOD and other
big industry issues. Schacter is known for his work in network security,
security architecture, security governance, network identity and policy
systems and remote work infrastructure.
Enterprise security expert Eric Ogren, Ogren
Group, will lead a third session focused on data protection. Ogren
has worked with a number of security vendors as well as provided clients
with sound advice on their security infrastructure.
The TCG session also will include demonstrations of TCG technologies,
including SEDs for data
security and multi-factor
authentication and assurance. Today, more than a billion endpoints
deploy Trusted Computing specifications.
The Trusted Computing Group (News - Alert) (TCG) provides open standards that enable a
safer computing environment across platforms and geographies. Benefits
of Trusted Computing include protection of business-critical data and
systems, secure authentication and strong protection of user identities,
and the establishment of strong machine identity and network integrity.
Organizations using built-in, widely available trusted hardware and
applications reduce their total cost of ownership. TCG technologies also
provide regulatory compliance that is based upon trustworthy hardware.
More information and the organization's specifications and work groups
are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org.
Follow TCG on Twitter
and on LinkedIn.
Brands and trademarks are the property of their respective owners.
Tweet this: #RSA2013 session by TCG led by #IDC, #Gartner, #Ogren re
info assurance, cybersecurity. http://bit.ly/10PHESD
[ Back To Mobile Security Homepage's Homepage ]