• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home People Cybersecurity careers

TCG and OST2 partner to develop new cybersecurity experts

FutureCISO Editors by FutureCISO Editors
March 21, 2024
Photo by Mati Mango: https://www.pexels.com/photo/person-using-macbook-air-6330644/

Photo by Mati Mango: https://www.pexels.com/photo/person-using-macbook-air-6330644/

Share on FacebookShare on Twitter

Through a new technical security training program from the Trusted Computing Group (TCG) and OpenSecurityTraining2 (OST2), professionals and students can upskill in cybersecurity and enhance device security. Under the agreement, OST2 will develop a series of hands-on, lab-driven classes to help individuals understand, develop and effectively utilise the Trusted Platform Module (TPM). 

Joe Pennisi

“TPMs are key to giving devices robust hardware-based protection rather than just software security and are a cornerstone of trusted computing. Alongside OST2, we hope the course will ensure greater awareness and understanding of how TPMs are used to safeguard sensitive data and fortify device security,” TCG president Joe Pennisi said. 

TPM course

The course features more than 15 practical exercises for software developers and students, even without prior TPM knowledge or experience.  

Xeno Kovah

Course participants will learn how to leverage the technology to enhance software and hardware security, safeguard cryptographic operations, address vulnerabilities, and strengthen the security of cryptographic keys.

“OST2 cares deeply about improving the state of cybersecurity. Increasing the adoption of hardware-backed security like the TPM is key to having trustworthy computing systems,” said OST2 founder Xeno Kovah. 

Participants will be invited to join the TPM.dev Users Group to gain further insights into utilising TPM and harness their skills in enhancing software security using the TPM.

Related:  APJ firms struggle with some cybersecurity tasks
Tags: cybersecurityOpenSecurityTraining2Trusted Platform Module
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl