Secure hardware is being tasked with enabling higher levels of security and trust in devices, providing a potential cornerstone for the security of the modern IT infrastructure. In this event we first introduce the Trusted platform module (TPM), and how the current security research seeks to use it for high levels of user and device based security through refined trust. In the second part we take a closer look at the TPM in action. In this session we investigate a peculiar security setting found in one of the most prominent secure boot loading processes (Bitlocker), and we’ll talk about why this can be a grand example of “too much trust”.
Level and prerequisites
This is a session for the IT security involved. You should have some background knowledge about generic security concepts and cryptography, and know what a Public Key Infrastructure is.
Speaker: Benjamin Larsen, DTU
Organizers: Philip Metin Özari & Kåre Løvgren, IDA IT
----------------------------------------
Registration procedure for the webinar:
Once you have registered you will receive a confirmation e-mail. At the bottom of this mail you will find a link to the webinar. You log in through this link and are forwarded to the site where the webinar is shown.
Should you have any problems logging in, you are welcome to contact us at: webinarsupport@ida.dk
Also check out our FAQ site where you can get answers to the most frequently asked questions in connection with webinars: FAQ about IDA webinars
Privacy info: If you would like to participate anonymously, we recommend you join by browser instead of using the Zoom software client or app, and when Zoom asks you to provide your name you can enter "Anon" or another pseudonym. Zoom processes personal information in global datacenters including USA and processing is carried out according to EU Commission standard data protection clauses. Privacy Shield. For further details, we refer you to the Zoom privacy policy available here: https://zoom.us/privacy
Organizer: IDA IT
Sign up: Not a member? In order to sign up, you must create a user profile. Note, when creating a user profile, you will be able to access IDA's online services - you will not become a member of IDA.
Important information regarding personal data on participant lists
Your name, title and company will appear on the attendance list for this event. The participant list is available to the organizer and the other participants on the event itself, in the form of a physical participant list and online attendance list. In addition, at some events, name tags are provided, where your name, title and company appear. If you unsubscribe from the event, your information will not appear in the attendance list.
When you are registered as a participant at this webinar, you will also automatically receive info about the next webinar within the same subject area.