MRO Magazine

Trusted Computing Group (TCG) to Discuss Trust, Security and Internet of Things (IoT) at Embedded Systems Conference Silicon Valley 2015

July 13, 2015 | By Business Wire News

PORTLAND, Ore.

Trusted Computing Group will present and demonstrate how trust enables better security in the Internet of Things (IoT) at the Embedded Systems Conference (ESC) Silicon Valley 2015.

TCG, which has developed numerous specifications including the Trusted Platform Module, self-encrypting drives and trusted networks, will host a training session on Tuesday, July 21, at 10:00 a.m. Steve Hanna, TCG IoT committee co-chair, will discuss “The Untrusted IoT: A Path to Securing Billions of Insecure Devices” in the Newport Room, Santa Clara Marriott. His talk will address the role of trust in the IoT and how developers can embed trust for enhanced security.

At Pedestal 5 in the exhibition area, TCG will demonstrate the application and benefit of trust in a smart building scenario, with technologies from Cisco and Infineon ensuring that data from sensors and actuators managed in the cloud and connected on the public Internet are secured using authentication via the TPM. Integrity reports are provided as well, and security threats, including malware and fake devices, are detected and blocked, using open source code supporting TCG’s Trusted Network Communications specifications and a variety of vendor devices.

More than 2,000 technical professionals and embedded systems hardware, software and firmware developers will attend ESC Silicon Valley July 20-22, 2015 to learn about the latest techniques and tips for reducing time, cost and complexity in the embedded development process.

TCG offers an active Embedded Systems Work Group, which includes a committee dedicated to IoT security. That work group also has published a new spec for the TPM in automotive security. Companies wishing to join TCG in its standards development efforts and application of TCG specifications to embedded systems and other environments can find more information on membership at https://www.trustedcomputinggroup.org/join_now.

About TCG

More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Tweet this: Trust=security in #IoT. @ESC_Conf July 21, learn why, how & see in action @TrustedComputin @ciscosecurity @Infineon ow.ly/OPXiH

PR Works, Inc.
Anne Price, +1-602-330-6495
anne@prworksonline.com
Twitter: @TrustedComputin

Advertisement

Stories continue below

Print this page