Market Snapshot
  • U.S.
  • Europe
  • Asia
Ticker Volume Price Price Delta
DJIA 16,408.54 -16.31 -0.10%
S&P 500 1,864.85 2.54 0.14%
NASDAQ 4,095.52 9.29 0.23%
Ticker Volume Price Price Delta
STOXX 50 3,155.81 16.55 0.53%
FTSE 100 6,625.25 41.08 0.62%
DAX 9,409.71 91.89 0.99%
Ticker Volume Price Price Delta
NIKKEI 14,512.38 -3.89 -0.03%
TOPIX 1,171.40 -1.97 -0.17%
HANG SENG 22,760.24 64.23 0.28%

The Trusted Computing Conference Announces Microsoft, the Trusted Computing Group and Wave Systems Corp. as Diamond Sponsors


The Trusted Computing Conference Announces Microsoft, the Trusted Computing Group and Wave Systems Corp. as Diamond Sponsors

ORLANDO, FL -- (Marketwired) -- 08/26/13 -- The inaugural Trusted Computing Conference, which will take place Sept. 9-12, has secured Microsoft, the Trusted Computing Group (TCG) and Wave Systems Corp. as Diamond Sponsors. The three-day event, held at the Rosen Centre in Orlando, Florida, will gather the most influential and powerful IT security individuals and businesses to unify the standards-based trusted computing message to further combat cyber threats.

"We're thrilled to have Microsoft, the TCG and Wave on board as our three Diamond sponsors for the inaugural Trusted Computing Conference next month. All three have played integral roles in helping shape and define what Trusted Computing means to the industry and have been true champions of the cause," said Robert Thibadeau, head of the Trusted Computing Conference Steering Committee. "Trusted Computing offers an innovative -- and very effective -- approach to combatting some of the thorniest cyber threats impacting the industry today."

"Microsoft is proud to be an active participant in the Trusted Computing Conference," said Steve Lipner, Partner Director of Software Security in Microsoft's Trustworthy Computing Group. "International industry groups like TCG are a vital part of coordinated efforts to help create a safer, more trusted information technology ecosystem."

"Attendees at the TCC will learn new ways to implement available Trusted Computing technologies using TCG standards and technologies," said Joerg Borchert, TCG President and Chairman. "Our members will address in a number of session topics regarding security automation, endpoint compliance, protection of devices beyond the PC architecture and the evolution of Trusted Computing."

Borchert will provide a keynote address titled, "Beyond One Billion Endpoints - A Short History of IT Security's Most Important Concept" on Tuesday, Sept. 10. Borchert will address endpoint security, TCG standards, and will share exciting examples of Trusted Computing in action. Attendees will also hear how the TCG works with government and standards groups worldwide.

In addition to Lipner, Borchert and Thibadeau, confirmed speakers at this year's TCC will include media and cyber security experts, such as Debora A. Plunkett, Director of the Information Assurance Directorate (IAD) for the National Security Agency (NSA); Richard Stiennon, founder of analyst firm IT-Harvest; and Derek Brink, Vice President, Research Fellow in IT security for the Aberdeen Group, as well as other recognized thought leaders and experts in the field of trusted computing.

This year's Trusted Computing Conference track sessions will include:


 
--  Track 1: What is Trusted Computing?
     Explore existing Trusted
    Computing Group technology and specifications that demonstrate the
    power of open-industry collaboration.
    
    
--  Track 2: Integrated & Applied Trusted Computing
     Learn how Trusted
    Computing can support virtualization, sandboxing, mobile device
    management, cloud computing, social networking and more.
    
    
--  Track 3: Trusted Computing, Law & Government
     Trusted Computing
    specifications and products are being integrated into various national
    technology and procurement directives. Legal and technology experts
    will explain how civil law intersects with Trusted Computing
    technologies.
    
    
--  Track 4: Trusted Computing for the Future: Vision & Advanced Uses
    
    Explore the design objectives, current product implementations, and
    future directions of Trusted Computing technologies for hardening the
    current software security solutions.

For information and to register, visit: www.trustedcomputingconference.com

Contact: Trusted Computing Conference 2013 c/o Corporate Communications 27 Otis Street, Suite 200 Westborough, MA 01581 Attn: Mike Dobinski P: 800-733-7185 F: 508-366-2545 Email: Exhibitsmanager@trustedcomputingconference.com

Sponsored Links
Advertisement
Advertisements
Sponsored Links
Advertisement