In Platform We Trust - Hardware Security Patterns for IoT
April 27, 2017
11 AM EST (UTC-4)
A strong foundation of hardware assisted security capabilities can be found below the OS in the hardware security layer which is shipped with each device processor. IoT presents a new set of demands where M2M or remote IoT management platforms need to attest software and identity running on the device. In this presentation, Intel delivers an overview of the core platform security capabilities and usage models for securing the IoT.
Saverio Romeo, Principal Analyst, Beecham Research
Saverio runs research in the areas of M2M, Internet of Things, and wearable technologies. He has published in areas such as mobile healthcare, smart cities, smart utility, data analytics, smart farming, M2M/IoT connectivity, and M2M/IoT platforms. Previously, Saverio worked as an M2M/mobile analyst at Frost & Sullivan, telecommunications policy analyst at Technopolis Group and European Commission and as a software developer at DS Group.
He holds three Master Degrees, one in Telecommunications Engineering, one in Information Technologies and one in Innovation Management and Technology Policy.
Jennifer Gilburg Director of Strategy, Internet of Things Identity, Intel
Jennifer Gilburg leads strategy and go-to-market for Intel's Internet of Things identity and authentication product offerings. This includes driving Intel's Enhanced Privacy ID (EPID) as an industry standard for IoT identity and delivering compelling use cases based on EPID such as "0" touch device onboarding. Jennifer's focus is ensuring the IoT is built with privacy and security mind, and promoting interoperability to facilitate solutions.