RSA Next Week: Trusted Platforms and IoT & Government Data in the Crosshairs

Attendees at the 2015 RSA Security Conference in San Francisco. The Security Ledger will be taking place in two sessions at RSA 2016 next week!
Attendees at the 2015 RSA Security Conference in San Francisco. The Security Ledger will be taking place in two sessions at RSA 2016 next week!

In-brief: RSA Conference is next week. The Security Ledger will lead two sessions looking at a hardware root of trust for Internet of Things, and the challenge of securing government data in an age of cloud computing. 

The RSA Security Conference is the biggest security industry confab in North America. Like other security shows: there are plenty of technical presentations, seminars, and panel discussions. There aren’t so many 0days dropped (as in, probably, zero 0days), but there is lots of what biologists might call “assortative mating” that goes on. If RSA didn’t exist, folks in the industry say, someone would almost certainly need to invent it.

Like most of the security world, I’ll be heading out to San Francisco to attend the conference next week. And I’m proud to say that Security Ledger will be taking part in this year’s Conference on two days: Monday and Wednesday.

On Monday, I’ll be the moderator for a panel at the Trusted Computing Group event. TCG is hosting a conversation about “Securing the Internet of Things with Trusted Computing.” As part of that, I’ll lead a discussion of “Things to do with the TPM” (Monday, 10:00 AM PT at Moscone West) Joining me on stage will be Paul England of Microsoft and Matthew Garrett of CoreOS.

It’s going to be a great talk – we’ll talk about how the Trusted Computing Group and its Trusted Platform Module (TPM) technology can enable key developments that are needed to make security scale on the Internet of Things. An example? Getting rid of passwords and finding ways to do authentication securely and at scale. Microsoft is one company that is pursuing what might be described as “next generation” user credentials and TPM (along with standards from groups like The FIDO Alliance) are playing an important part in that.

Check out the What to do with TPM panel Monday, February 29, 2016 at 10:10 AM PT at Moscone West, Room: 2006.

On Wednesday I’ll be moderating an equally fascinating discussion of privacy, security and cloud computing: “Government in the Crossfire: Data Privacy in an Era of Growing Cyberthreats.”

I’ll be joined on stage by some security and privacy all stars: Lee Tien of Electronic Frontier Foundation, J.R. Reagan, the Chief Information Security Officer at Deloitte and Flint Waters, the CISO of the State of Wyoming.

Our conversation will look at a number of issues that surround the (rapid) shift in public sector computing to the cloud. While local, state and the federal government stand to benefit tremendously from the consolidation of computing power and data in the cloud, serious concerns about the security and privacy surround any move to cloud based platforms operated by Google, Amazon, Rackspace or any number of other providers.

What are the hurdles for government agencies to adopt the cloud? What guarantees must be put in place to balance the mistrust citizens have in the how the government could use their data in the cloud? What efficiencies can local, state and federal government agencies realize by migrating silo’d applications and data to centrally managed cloud platforms? What changes does the shift to cloud necessitate within public sector IT departments and organizations?

Check out the Government in the Crossfire panel Wednesday, March 2, 2016 at 10:20 AM PT at Moscone West, Room: 2016.

Comments are closed.