Implementing Hardware Roots of Trust

  • Tuesday, 18 Jun 2013 1:00PM EDT (18 Jun 2013 17:00 UTC)
  • Speakers: Gal Shpantzer, John Pescatore, Chris Hallum, Stacy Cannady

When the Trusted Platform Module (TPM) was first introduced, it held the promise of a real breakthrough in enterprise security, and security professionals still look to TPM to deliver the trust their end users demand. TPM's hardware-based security capabilities significantly reduce the risk of data compromises from both external attacks and the physical loss of a computer or other device. TPM has the backing of the industry heavy-hitters in the Trusted Computing Group, including Microsoft, and is now embedded in more than a billion devices from most major computer makers. But apart from its ubiquitous use in set tops, gaming consoles and other nontraditional devices, TPM has yet to be adopted on a large scale by enterprises.

Now, however, with TPM embedded in new Windows 8 and Server 2012 machines, and with the growing importance of mobility, the time is right for enterprise security practitioners and other IT professionals to learn how to make the most of its features. In this SANS webcast, you'll learn how TPM can be leveraged for pre-boot system integrity checks, as well as tools and techniques for deployment and security system integration, whole disk protection, key management, and other critical aspects of a TPM-secured environment.

These and many other critical issues will be discussed by SANS analysts Gal Shpantzer and John Pescatore, joined by Chris Hallum of Microsoft and recognized TPM subject-matter expert Stacy Cannady.

Click here to view the associated whitepaper.