Security Industry Analysts and Experts to Headline Trusted Computing Group
RSA Conference 2014 Session
Jon Oltsik, Victor Wheatman, Paul Roberts and Gal Shpantzer Join Panelists
from DMI, Intel, Juniper Networks, JWSecure, Microsoft, Mobile Active Defense,
NIST and Boeing for Sessions on Security Automation, TPM and Mobile Security
RSA Conference USA 2014
PORTLAND, Ore. -- February 7, 2014
Experts from around the security community will tackle issues and challenges
for endpoint compliance and security automation, the TPM, and mobile security
in an association session at the RSA Conference 2014, hosted by Trusted
The session is Mon., Feb. 24, 10 a.m. – 2 p.m. in Room 2018 at Moscone Center
West (second floor). RSA attendees with the Expo or conference pass can
attend; registration is open at
Joerg Borchert, TCG president, will greet attendees with opening remarks,
followed by a panel at 10:15 a.m., “Endpoint Compliance and Security
Automation.” Jon Oltsik, ESG, will moderate with panelists Steve Whitlock,
chief security architect, The Boeing Company; Dan Griffin, founder, JWSecure;
and Dave Waltermire, NIST security automation architect.
“Will the Real TPM Please Stand Up” will follow, moderated by Paul Roberts,
founder and publisher, SecurityLedger.com. Intel Security Architect Monty
Wiseman and security consultant and SANS author Gal Shpantzer will join
Roberts in discussion of new features of the TPM and its role in the
increasingly connected Internet of Things, along with Dustin Ingalls, Windows
A final session, “Mobile Device Security: Fact or Fiction,” will look at the
issues around BYOD and mobile security and the role of trust. DMI CISO Rick
Doten and Eric Green, vice president of sales, Mobile Active Defense, will
join moderator Victor Wheatman, independent security analyst. Jason Conyard,
Juniper networks vice president, IT, end user services, will talk about how
Juniper handles BYOD and security.
A demonstration showcase will run between the sessions.
Get more information here,
More information and TCG’s specifications and work groups are available at the
Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG
on Twitter and on LinkedIn.
Brands and trademarks are the property of their respective owners.
Tweet this: TCG #RSAC session Feb. 24 panels with ESG, Microsoft, NIST & more
to cover TPM, endpoint compliance & security automation, mobile security,
PR Works, Inc.
Anne Price, +1-602-330-6495
Press spacebar to pause and continue. Press esc to stop.