InvestorsHub Logo
Followers 16
Posts 4735
Boards Moderated 0
Alias Born 07/21/2003

Re: None

Monday, 10/09/2006 11:56:19 PM

Monday, October 09, 2006 11:56:19 PM

Post# of 249374

http://2006.rsaconference.com/europe/agenda/tutorials.aspx

Trusted Computing Group (TCG) Pre-Conference Seminar
Fact or Fiction: The Trusted Enterprise – 6-part session!

Part 1: The State of Security in the Enterprise and Role of Trusted Computing
10:30am – 11:00am
Speakers: Brian Berger, Chairperson, Marketing Work Group, Trusted Computing Group and Vice President Marketing and Sales, Executive Wave Systems

Everyone is talking about security, but what is really being done at the system and enterprise level and what is reasonable to implement? Brian Berger of Trusted Computing Group will provide a brief overview of emerging issues, Trusted Computing concepts, issues of privacy and owner control and how security can be implemented today.


Part 2: Who Is On My Network? The Trusted Network Connect Architecture and Deployment
11:00am – 11:30am
Speakers: Steve Hanna, Co-Chair, Trusted Network Connect, Trusted Computing Group and Distinguished Engineer, Juniper Networks

Client network connection requests are granted or denied based on the client’s ability to prove credentials, including passwords and certificates. This approach ignores the possibility that the client contains malicious code (e.g. viruses, Trojans, malware) that spreads through the network once connected. The Trusted Network Connect approach provides a method to ascertain end-point integrity for clients seeking connectivity to a network. Through trusted network connection protocols and trusted platform mechanisms, platforms can be authenticated before being given full network connectivity. This speaker will address the Trusted Network Connect architecture, similar efforts and the role of the widely deployed Trusted Platform Module in TNC.


Part 3: Securing Data - A Discussion of Portable Security
11:45am – 12:15pm
Speaker: Michael Willett, Ph.D, Member of the Technical Committee, Trusted Computing Group and Research Staff, Seagate Technology

Michael Willett, co-chair of TCG’s Storage Work Group and research staff, Seagate, will address storage systems, such as disk drives and other computing-system peripherals. These are critical components of a security, privacy, and trust configuration of a computing platform. In fact, data spends most of its productive life in storage. This session provides a framework with which to understand why and how peripheral devices should be secured as independent roots of trust. The framework provides a generic security model for all peripheral devices, and shows how peripherals can be configured as roots of trust, each playing a complementary role in establishing the overall security and privacy goals of platform-based and networked computing.

The session begins with security measures for storage systems that exist today and their relative effectiveness. It will then go into where and how to secure access control of the storage system, discussing in detail what needs to be controlled and how to grant control in a secure manner.

The Trusted Computing Group’s Trusted Storage Use Cases will be reviewed in depth, highlighting the technical requirements being solved by the formal specifications. Relationships and cooperation with other industry storage standards (eg, SCSI and ATA, SNIA) will be discussed, and the TCG’s specification for secure and trusted storage will be outlined


Part 4: Microsoft Vista Bitlocker and Trusted Computing Platforms
1:00pm – 1:30pm
Speaker: Austin Wilson, Director, Windows Vista Security, Microsoft Corporation

BitLocker™ Drive Encryption is a data protection feature available in Windows Vista and is Microsoft’s response to one of our top customer requests: address the very real threats of data theft or exposure from lost, stolen or inappropriately decommissioned PC hardware with a tightly integrated solution in the Windows Operating System.

Data security on lost or stolen PC devices is a growing concern among security experts and corporate executives. The data stored on the PC asset is typically significantly more valuable to a corporation than the asset itself, and the loss, theft or unwanted revelation of that data can be very damaging.

Recent government regulations have emerged that focus on data protection and privacy and were originally designed to safeguard consumer information. This legislation has a strong impact on organisational storage policies, especially for PC devices that have a relatively short lifespan and are easily lost or stolen. BitLocker prevents a thief who boots another operating system or runs a software hacking tool from breaking Windows Vista file and system protections or performing offline viewing of the files stored on the protected drive.

This session will give an overview of how BitLocker provides full volume encryption with key storage in a Trusted Platform Module (TPM) v1.2 chip. Details on how BitLocker can be deployed in the enterprise, including escrow of recovery keys and in the field recovery, will be covered.


Part 5: What Can I Do with Trusted Computing?
1:30pm – 2:15pm
Speakers: Shab Madina, Product Marketing Manager, Personal Systems Group, Hewlett Packard and Bruno Leconte, Wave Systems

Applications experts will share a discussion addressing applications development and how Trusted Computing can be deployed today using existing hardware and software. Applications to be addressed include theft, password management and protection, data encryption and case studies of IT organizations using these technologies. Also to be addressed are secure VPNs, digital key management, multifactor authentication and client integrity. Speakers will talk about issues and challenges affecting both developers and users of Trusted Computing.


Part 6: TCG Seminar Q&A / Discussion
2:15pm – 2:30pm

Wavxmaster



One quarter at a time!

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.