Home » Internet, Picture Gallery » The Trusted Computing Conference Announces Microsoft, the Trusted Computing Group and Wave Systems Corp. as Diamond Sponsors

The Trusted Computing Conference Announces Microsoft, the Trusted Computing Group and Wave Systems Corp. as Diamond Sponsors

ORLANDO, FL — (Marketwired) — 08/26/13 — The inaugural , which will take place Sept. 9-12, has secured Microsoft, the Trusted Computing Group (TCG) and Wave Systems Corp. as Diamond Sponsors. The three-day event, held at the Rosen Centre in Orlando, Florida, will gather the most influential and powerful IT security individuals and businesses to unify the standards-based trusted computing message to further combat cyber threats.

“We-re thrilled to have Microsoft, the TCG and Wave on board as our three Diamond sponsors for the inaugural Trusted Computing Conference next month. All three have played integral roles in helping shape and define what Trusted Computing means to the industry and have been true champions of the cause,” said Robert Thibadeau, head of the Trusted Computing Conference Steering Committee. “Trusted Computing offers an innovative — and very effective — approach to combatting some of the thorniest cyber threats impacting the industry today.”

“Microsoft is proud to be an active participant in the Trusted Computing Conference,” said Steve Lipner, Partner Director of Software Security in Microsoft-s Trustworthy Computing Group. “International industry groups like TCG are a vital part of coordinated efforts to help create a safer, more trusted information technology ecosystem.”

“Attendees at the TCC will learn new ways to implement available Trusted Computing technologies using TCG standards and technologies,” said Joerg Borchert, TCG President and Chairman. “Our members will address in a number of session topics regarding security automation, endpoint compliance, protection of devices beyond the PC architecture and the evolution of Trusted Computing.”

Borchert will provide a keynote address titled, “Beyond One Billion Endpoints – A Short History of IT Security-s Most Important Concept” on Tuesday, Sept. 10. Borchert will address endpoint security, TCG standards, and will share exciting examples of Trusted Computing in action. Attendees will also hear how the TCG works with government and standards groups worldwide.

In addition to Lipner, Borchert and Thibadeau, confirmed speakers at this year-s TCC will include media and cyber security experts, such as Debora A. Plunkett, Director of the Information Assurance Directorate (IAD) for the National Security Agency (NSA); Richard Stiennon, founder of analyst firm IT-Harvest; and Derek Brink, Vice President, Research Fellow in IT security for the Aberdeen Group, as well as other recognized thought leaders and experts in the field of trusted computing.

This year-s Trusted Computing Conference track sessions will include:

Explore existing Trusted Computing Group technology and specifications that demonstrate the power of open-industry collaboration.

Learn how Trusted Computing can support virtualization, sandboxing, mobile device management, cloud computing, social networking and more.

Trusted Computing specifications and products are being integrated into various national technology and procurement directives. Legal and technology experts will explain how civil law intersects with Trusted Computing technologies.

Explore the design objectives, current product implementations, and future directions of Trusted Computing technologies for hardening the current software security solutions.

For information and to register, visit:

Trusted Computing Conference 2013
c/o Corporate Communications
27 Otis Street, Suite 200
Westborough, MA 01581
Attn: Mike Dobinski
P: 800-733-7185
F: 508-366-2545

Posted by on 26. August 2013. Filed under Internet, Picture Gallery. You can follow any responses to this entry through the RSS 2.0. You can leave a response or trackback to this entry

You must be logged in to post a comment Login


Recent Comments

    © 2021 So-Co-IT. All Rights Reserved. Log in

    - Copyright by LayerMedia

    Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de