Trusted Computing Group Shows Trusted Platform Module Security at RSA Europe

Users to Get Hands-on with Trusted Platform Module, Network Security, Self-Encrypting Drives

PORTLAND, OR.: Attendees at the security RSA Europe Conference held from October 27 to October 29 at the London ExCel Centre, can learn first-hand how to protect their data, network and systems at a seminar hosted by the Trusted Computing Group (TCG).

The session, “Trusted Computing in Action: A Hands-On Day to Secure Data and Systems,” will take place on Monday, October 27th 11:30 a.m. - 5:00 p.m. in the ExCel Centre’s Platinum Room 5/6/7 – Level 2. It is free to attend, but registration is requested at Group_Seminar.aspx.

Session presenters include RSA alumni Brian Berger, who is a TCG board member and marketing work group chair; frequent RSA speaker and panelist Steve Hanna, TCG Trusted Network Connect work group co-chair and Juniper distinguished engineer; Dave Anderson, director of strategic planning and Liam Rainford, senior engineering manager, Northern Europe, Seagate Technology; and Soenke Sothmann, Infineon.

Brian Berger, also executive vice president, marketing and sales, Wave Systems, will address the topic of passwords in an RSA technology showcase session “Machine Authentication: Stop the Password Madness with the TPM” on Tuesday, October 28, 11:15 a.m. on the exhibitor floor. On Wednesday, October 29, 10:30 a.m., Steve Hanna will address “NAC 2.0: Unifying Network Security” in the Network Security Track.

Throughout the show, RSA attendees can see various applications of the Trusted Platform Module, network security and self-encrypting drives in action on the exhibit floor in TCG Stand 4.

Trusted Computing Group develops specifications, including the Trusted Platform Module, Trusted Network Connect network security and hardware-based encrypted storage, to enable computing security across the enterprise.

Trusted Computing Group, an industry organization that enables computing security, has created a portfolio of specifications to enable more secure computing across the enterprise in PCs, servers, networking gear, applications and other software, hard drives and embedded devices.

More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, The group’s blog, at, offers commentary from work group chairs and experts in the fields of computing and security.

Source: Trusted Computing Group