Security Industry Analysts and Experts to Headline Trusted Computing Group RSA Conference 2014 Session Jon Oltsik, Victor Wheatman, Paul Roberts and Gal Shpantzer Join Panelists from DMI, Intel, Juniper Networks, JWSecure, Microsoft, Mobile Active Defense, NIST and Boeing for Sessions on Security Automation, TPM and Mobile Security RSA Conference USA 2014 Business Wire PORTLAND, Ore. -- February 7, 2014 Experts from around the security community will tackle issues and challenges for endpoint compliance and security automation, the TPM, and mobile security in an association session at the RSA Conference 2014, hosted by Trusted Computing Group. The session is Mon., Feb. 24, 10 a.m. – 2 p.m. in Room 2018 at Moscone Center West (second floor). RSA attendees with the Expo or conference pass can attend; registration is open at http://www.rsaconference.com/events/us14/register. Joerg Borchert, TCG president, will greet attendees with opening remarks, followed by a panel at 10:15 a.m., “Endpoint Compliance and Security Automation.” Jon Oltsik, ESG, will moderate with panelists Steve Whitlock, chief security architect, The Boeing Company; Dan Griffin, founder, JWSecure; and Dave Waltermire, NIST security automation architect. “Will the Real TPM Please Stand Up” will follow, moderated by Paul Roberts, founder and publisher, SecurityLedger.com. Intel Security Architect Monty Wiseman and security consultant and SANS author Gal Shpantzer will join Roberts in discussion of new features of the TPM and its role in the increasingly connected Internet of Things, along with Dustin Ingalls, Windows Security, Microsoft. A final session, “Mobile Device Security: Fact or Fiction,” will look at the issues around BYOD and mobile security and the role of trust. DMI CISO Rick Doten and Eric Green, vice president of sales, Mobile Active Defense, will join moderator Victor Wheatman, independent security analyst. Jason Conyard, Juniper networks vice president, IT, end user services, will talk about how Juniper handles BYOD and security. A demonstration showcase will run between the sessions. Get more information here, http://www.trustedcomputinggroup.org/media_room/events/153. More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn. Brands and trademarks are the property of their respective owners. Tweet this: TCG #RSAC session Feb. 24 panels with ESG, Microsoft, NIST & more to cover TPM, endpoint compliance & security automation, mobile security, http://bit.ly/1d5lnD2 Contact: PR Works, Inc. Anne Price, +1-602-330-6495 firstname.lastname@example.org Twitter: @TrustedComputin
Security Industry Analysts and Experts to Headline Trusted Computing Group RSA Conference 2014 Session
Press spacebar to pause and continue. Press esc to stop.