Star 0

Abstract

Discuss the TPM hardware and software enabling challenges for a standards-based root of trust for Industrial Controllers. Discuss the hardware options (e.g., discrete, virtual) for implementing a TPM and the various tools available to software. Extending concepts from Session TECH-F03 to using the TPM’s capability to protect information to and from devices and enhancing existing and new protocols. Attendance is strictly limited to allow for a small group experience.