Work from Home- Telecon Mask

Spotlight Podcast: Securing the Enterprise’s New Normal

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Steve Hanna joins us to talk about COVID 19 and the security risks that go along with the “new normal” that has emerged out of the pandemic. While organizations face challenges securing remote workers, Steve also sees more than a glimmer of a silver lining to the disruption caused by the Corona Virus.


For a world grown weary of COVID and “shelter in place,” there is light at the end of the tunnel. Countries in Europe, Asia and the Pacific region are beginning to re-open after months shut down to combat the COVID virus. Soccer (aka “football”) has resumed in Germany. Baseball is slated to resume in June in Japan. Bars and gyms are opening in parts of Europe. Australia and New Zealand have re-opened after nearly eliminating COVID from their populations

Spotlight Podcast: Building Resilience into the IoT with Rob Spiger

However, while many suspended activities – and life itself- will eventually resume, there are many changes brought about by the current pandemic and our fight against it that will remain. That is especially true in the business world, where remote work from home, less travel and more virtual collaboration may become the new normal. 

Steve Hanna at Infineon
Steve Hanna is a Senior Principal at Infineon and head of the Embedded Systems Workgroup at TCG.

Spotlight: as Attacks Mount, how to secure the Industrial Internet

But the new normal introduces unknowns: from bandwidth and remote access limitations to business email compromises. In this episode of the podcast, we invited Steve Hanna of the firm Infineon back onto the podcast. Steve is the co-chair of the Embedded Systems Workgroup within the Trusted Computing Group. In this conversation, Steve and I talk about the good and bad of COVID – about the dire disruptions to daily life and also how COVID is likely to accelerate some long overdue and needed changes in the way businesses, individuals and societies work. 

Check out our full conversation above!


(*) Disclosure: This podcast and blog post were sponsored by Trusted Computing Group. For more information on how Security Ledger works with its sponsors and sponsored content on Security Ledger, check out our About Security Ledger page on sponsorships and sponsor relations.

As always,  you can check our full conversation in our latest Security Ledger podcast at Blubrry. You can also listen to it on iTunes and check us out on SoundCloudStitcherRadio Public and more. Also: if you enjoy this podcast, consider signing up to receive it in your email. Just point your web browser to securityledger.com/subscribe to get notified whenever a new podcast is posted. 

2 Comments

  1. Hello,
    Security Ledger is one of the best websites on Google. We can read your article, It’s very interesting and Important for me. Your team is doing work very hard and create the best content for the People. We have also 25 people team in our company. All team members are very intelligent, graduate and responsible for our work. our website is click here

  2. Pingback: Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things | The Security Ledger

We want to hear your thoughts! Leave a reply.

This site uses Akismet to reduce spam. Learn how your comment data is processed.