TCG Members Infineon, Microsoft and OnBoard Security to Host Security Solutions Workshop and Demonstrations at Internet of Things North America

PORTLAND, Ore., April 12, 2018 – Trusted Computing Group (TCG) and members Infineon, Microsoft and OnBoard Security will host a workshop on securing the vulnerable IoT on  May 30, 2018, at the Internet of Things North America (@IOTShow) conference.

IoT and embedded systems and networks remain highly vulnerable to attacks, whether malicious or accidental. These attacks result in lost personal and corporate data, legal fines, loss of customer trust and loss of services – or they can also shut down critical infrastructure, from oil and gas pipelines to manufacturing to the financial system.

AWS Builder Community Hub

The workshop will offer attendees a look at real-world solutions and technologies, based on widely vetted and adopted standards, to secure IoT systems, networks and data. Speakers will address the role and implementation of a root of trust, secure software to support a root of trust and how we can embed trust and security into networks. Experts also will demonstrate examples of these technologies and talk about resources and tools to implement them.

Speakers include Steve Hanna, Infineon Technologies and co-chair of the IoT and other TCG work groups; Lee Wilson, OnBoard Security and chair of TCG’s Trusted Software Stack work group; and Dennis Mattoon, Microsoft and chair, TCG DICE work group.

In addition to strategies for identifying and preventing attacks, the session will include demonstrations from the participating companies and a question-and-answer session. Register here.

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.  More information is available at Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

*** This is a Security Bloggers Network syndicated blog from Trusted Computing Group authored by TCG Admin. Read the original post at: