Trusted Computing Group to Host “Paradox of Security” Session at RSA Conference 2012

Half-day Seminar and Demos to Address Trust and Security in Storage, Networks, Cloud Computing and Mobile Devices

RSA Conference 2012

PORTLAND, Ore.--()--The Trusted Computing Group (TCG), a worldwide open industry standards organization, will host its popular annual half-day seminar at the RSA Conference as part of the conference’s Association Events schedule.

“The Paradox of Security: Is the Status Quo Acceptable?” will be held Monday, Feb. 27, 10 a.m. – 2 p.m. in Esplanade Room 301-303, Moscone Center, San Francisco. The session will include a number of sessions and a boxed lunch, as well as demonstrations of widely available network security solutions, self-encrypting drives and systems protected with the Trusted Platform Module, all based on TCG specifications.

Attendees will learn more about using a hardware root of trust as an anchor for data leak and malware prevention; platform integrity; device and user identity; and network access for fixed and mobile devices used enterprise-wide.

“Chaos currently rules in the security market,” notes Brian Berger, Trusted Computing Group director and marketing work group chair. “In a world where users routinely and unknowingly surrender personal information and choice, TCG and its members provide industry-accepted security solutions to any platform.”

The program will include discussion by worldwide enterprises about using self-encrypting drives (SEDs), automating security and security for the bring-your-own-device trend.

Users and security experts also will address cloud security topics including compliance, data centers and visibility into the cloud and mobile device security. Speakers include:

  • Hussein Syed, St. Barnabas Healthcare
  • Mark Mulvaney, Boston Medical Center
  • Dean Notarnicola, Daiichi Sankyo Inc.
  • Nicolas Ponsini, Gemalto
  • Leslie Andresen, General Dynamics C4 Systems
  • Shawn Mullen, IBM
  • James Greene, Intel Corporation
  • Steve Orrin, Intel Corporation
  • Steve Hanna, Juniper Networks
  • James Clifford, Los Alamos National Laboratory
  • David Lennon, Lumeta Corporation
  • Paul Bartock, National Security Agency
  • Michael Willett, Samsung
  • Jason Cox, Seagate Technology
  • Rob MacBride, United Network for Organ Sharing
  • Thi Nguyen Huu, WinMagic

The TCG session is free to those registered for RSA. The complete agenda and additional information can be found at http://www.trustedcomputinggroup.org/media_room/events/112.

The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Contacts

PR Works, Inc.
Anne Price, 602-840-6495
anne@prworksonline.com

Release Summary

The Trusted Computing Group (TCG) will host "The Paradox of Security" seminar Feb. 27, 10 a.m. - 2 p.m. at the RSA Conference, Moscone Center, San Francisco.

Contacts

PR Works, Inc.
Anne Price, 602-840-6495
anne@prworksonline.com