Learn to Use New Trusted Computing Software Stack in Webcast Feb. 15, 2018

On Feb. 15, 10:00 a.m. Pacific/1:00 p.m., TCG will host a webcast on using the new TCG software stack for securing devices and data.

Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

The TCG Software Stack is a software specification that provides a standard API for accessing the functions of the TPM. Application developers can use this software specification to develop interoperable client applications for more tamper-resistant computing.

Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security’s TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security’s post-quantum cryptography (NTRU and pqNTRUsign).

Register here: https://www.brighttalk.com/webcast/7423/297251?utm_source=Trusted+Computing+Group&utm_medium=brighttalk&utm_campaign=297251.

More info on the software stack supporting the TPM is here: https://trustedcomputinggroup.org/work-groups/software-stack/

This is a Security Bloggers Network syndicated blog post authored by TCG Admin. Read the original post at: Trusted Computing Group