In addition to the slides of my recent talk about trusted computing at the CIS in Stanford, there is also an audio version available.
Furthermore, I have created a version which synchronizes the slides and the audio version. It is available here. I do not really like the synchronized version as it cannot be viewed with Firefox (basically, you have to use Microsoft Internet Explorer and Microsoft Windows Media Player 9), and, on many computers, the whole audio file must be downloaded first and cannot be streamed. But I thought the version might still be of some interest.
Finally, one word about the audio versions of the talk: During the presentation, I made one factual error while presenting TCG technology. When I talked about how a chain of trust can be established from the CRTM and the TPM up to individual software applications, I said that each component in the chain of trust first measures its own integrity and then passes control on to the next component in the chain. This is only true for the CRTM, the first component in the chain. For all other components, the creation of the chain works a little bit different: each component measures the integrity of the component which is next in the chain before it passes on control to this component. Sorry about this misdescription.