Intelligent CISO Issue 84 | Page 51

COVER story

Joe Pennisi, President of the Trusted Computing Group( TCG), tells us how TCG and its Trusted Platform Module( TPM), a secure crypto-processor which is attached to a device, can provide a strong first line of defence when a device is remotely attacked or physically stolen – providing robust, hardware-based protection instead of being solely reliant on software security programs.

PROTECTING YOUR DEVICES FOR 25 YEARS AND BEYOND: CELEBRATING THE TPM

ersonal devices, including laptops

P and computers, have completely transformed the way society operates. Whether device owners are accessing banking or healthcare applications, working remotely or visiting their favourite social media or entertainment channels, ensuring adequate security measurements are in place to avoid falling victim to a malicious attack is pivotal.

In 2024 the global average cost of a data breach was US $ 4.88 million, with hackers continuing to weaponise the devices we rely on to cause significant financial and reputational damage through ransomware and other sophisticated methods. It’ s not just remote attacks we need to worry about either: if a device is physically stolen, then its owner needs to be able to trust that the data and secrets held on the device will be sealed off against unauthorised access. This is where the Trusted Computing Group( TCG) and its Trusted Platform Module( TPM) comes in.
Protecting you from attacks
Ensuring the concept of trusted computing for 25 years now, the TPM is a secure crypto-processor which is attached to a device for secure operations. Using a TPM helps to protect a user’ s identity and sensitive data by storing the keys crucial to encryption, decryption and authentication. Doing so provides a strong first line of defence against potentially critical malware and firmware attacks, as all data will remain encrypted.
Currently sitting within over two billion devices worldwide, the TPM is a‘ silent guardian’ that ensures optimal device security despite the fact many people remain unaware of its existence. This includes the devices where the element of security may be an afterthought – such as printers and washing machines.
By implementing a TPM chip, devices gain robust, hardware-based protection rather than being solely
WWW. INTELLIGENTCISO. COM 51