Implementing Hardware Roots of Trust
- Tuesday, June 18th, 2013 at 1:00 PM EDT (17:00:00 UTC)
- Gal Shpantzer and John Pescatore
You can now attend the webcast using your mobile device!
When the Trusted Platform Module (TPM) was first introduced, it held the promise of a real breakthrough in enterprise security, and security professionals still look to TPM to deliver the trust their end users demand. TPMs hardware-based security capabilities significantly reduce the risk of data compromises from both external attacks and the physical loss of a computer or other device. TPM has the backing of the industry heavy-hitters in the Trusted Computing Group, including Microsoft, and is now embedded in more than a billion devices from most major computer makers. But apart from its ubiquitous use in set tops, gaming consoles and other nontraditional devices, TPM has yet to be adopted on a large scale by enterprises.
Now, however, with TPM embedded in new Windows 8 and Server 2012 machines, and with the growing importance of mobility, the time is right for enterprise security practitioners and other IT professionals to learn how to make the most of its features. In this SANS webcast, youll learn how TPM can be leveraged for pre-boot system integrity checks, as well as tools and techniques for deployment and security system integration, whole disk protection, key management, and other critical aspects of a TPM-secured environment.
These and many other critical issues will be discussed by SANS analysts Gal Shpantzer and John Pescatore, joined by Chris Hallum of Microsoft and recognized TPM subject-matter expert Stacy Cannady.
Click here to view the associated whitepaper.
has 12 years’ experience as an independent security professional, and is a trusted advisor to chief security officers of large corporations, technology and pharmaceutical startups, Ivy League universities and nonprofits. He has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the e-warfare course and presenting SANS@Night talks on cyberstalking, CAPTCHA and endpoint security. In 2009, Mr. Shpantzer founded and led the privacy subgroup of the NIST Smart Grid Cybersecurity Coordination Task Group, he is a co-author of the Managing Mobile Device Security chapter in the Information Security Management Handbook (2010), and he has collaborated in presenting the ongoing Security Outliers project at RSA, CSI, BSides and Baythreat conferences. Most recently, he was a subject-matter expert in the development of the U.S. Department of Energy's Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and he is currently working with the PACS-WG to alert and advise industrial controls system asset owners exposed on the internet.
joined the SANS Institute as director of emerging security trends in January 2013, with 35 years’ experience in computer, network and information security. Mr. Pescatore was Gartner’s lead security analyst for 13 years, working with global 5000 corporations and major technology and service providers. Before joining Gartner, he was Senior Consultant for Entrust Technologies and Trusted Information Systems, where he created and managed security consulting groups focusing on firewalls, network security, encryption and public-key Infrastructure, and spent 11 years with GTE developing secure computing and telecommunications systems. Mr. Pescatore began his career at the National Security Agency, where he designed secure voice systems, and the United States Secret Service, where he developed secure communications and surveillance systems.
is a Microsoft Senior Product Manager focusing on Windows Client Security for commercial business scenarios. He has been with Microsoft for fifteen years, and has worked in a number of engineering roles as a Program Manager in the Server and Tools Division (including experience in Windows Scripting, System Center Operations and Microsoft BitLocker Administration and Monitoring). Mr. Hallum moved into a product management role in 2011, and now manages the security features within the Windows Client operating system (malware resistance, data protection, and identity and access control).
Stacy Cannady is Technical Marketing - Trustworthy Computing TRIAD (Threat Response, Intelligence, and Development) for Cisco Systems and a member of the Trusted Computing Group's Embedded Systems Work Group, has worked in the field of trusted computing for ten years. His responsibilities as a subject-matter expert require an in-depth understanding of the trusted computing market, including advances in hardware and software security and vendor and customer market dynamics. Before joining DMI, Mr. Cannady held marketing leadership positions in trusted computing at IBM and at Lenovo, where he played a principal role in making the TPM standard equipment in ThinkPad and ThinkCenter PCs. He was also responsible for the security product strategy for IBM's PC Division and for Lenovo. This strategy required subject matter expertise in areas including firmware security, biometrics, smart cards, identity management, encryption and access control.