Securing the IoT and Embedded Systems: A Workshop from Trusted Computing Group
Thursday, June 28 | 1:00 pm - 4:30 pm
Executive Ballroom E
Embedded and IoT systems and networks remain highly vulnerable to attacks, whether malicious or accidental. These attacks result in lost personal and corporate data, legal fines, loss of customer trust and loss of services - or they can also simply shut down critical infrastructure, from oil and gas pipelines to manufacturing to the financial system. Despite the obvious security concerns, manufacturers worldwide continue churning out unprotected, connected things based on networks that were not intended to handle the security, traffic or things suddenly tied together. What can be done?
With Embedded Computing Design, Trusted Computing Group (TCG) will offer a session to discuss and demonstrate real-world solutions and technologies, based on widely vetted and adopted standards, to secure embedded and IoT systems, networks and data. The workshop will address the role and implementation of a root of trust, the development of secure software to support a root of trust and how we can embed trust and security into networks. Experts also will demonstrate examples of these technologies and talk about resources and tools to implement them.
1:00 – 1:10: Brandon Lewis – Welcome, agenda
1:10 – 1:45: TPM tutorial/concepts of trust/high level TSS (L. Wilson)
1:45 – 2:20: IoT and trust/security (S. Hanna)
2:20 – 2:40: Break/member demonstrations
2:40 – 3:15: DICE tutorial (Dennis Mattoon, Microsoft)
3:15 -3:55: Network Equipment tutorial (S. Hanna) – could swap this for related topic
3:55 – 4:30: Q&A/Networking and Demos