Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing Digital Identity and Assets with Confidential Computing Carole House ,NSC, Kay Turner , CDI, FinCEN , Raghu Nambiar VP, AMD ,Greg Woolf ,CEO, FiVerity , Ambuj Kumar , CEO, Fortanix Securing identity and infrastructure, as well as fighting fraud and safeguarding digital innovation and assets, is fundamental to securing the enterpr... July 26, 2022 4:00pm Enabling Confidential Computing Raghu K. Moorthy, Global Director & CTO, Team Red Hat, Intel This session provides an overview of Confidential Computing and it can be enabled in Red Hat® OpenShift®. with Intel® Software Guard Extensions (Intel... 3 weeks ago | 30 mins Introduction to cybersecurity with Ubuntu Pro on Azure Government Chris Huffman - VP of Public Sector, James HiIliard - Chief Architect, David Anstine - Cloud Solution Architect US government agencies and organizations in government-regulated industries face a huge challenge in complying with regulations and standards in order... 1 week ago | 41 mins Introduction to confidential computing on public clouds with Ubuntu Chris Huffman - VP of Public Sector, Ijlal Loutfi - Security Product Manager Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers an... 1 month ago | 47 mins Is the Data Really Gone? A Primer on the Sanitization of Storage Devices Jonmichael Hands, Chia Network; Jim Hatfield, Seagate; John Geldman, KIOXIA What do you think is a more secure way of securely removing data from a hard drive - putting it through a shredder, or doing an instant secure erase? ... 7 days ago | 64 mins Confidential Computing in Action: Securing Data and AI (Case study) Richard Searle, Vice President, CC Solutions, Fortanix , and Glen Otero, VP of Scientific Computing at (TGen) Increased adoption of cloud to host data and AI models have compounded security challenges and risk to privacy since the cloud is generally considered... 3 months ago | 59 mins Providing a Lifeline for Healthcare Practices with SD-WAN and Security Rob Ford, Meriplex | Mike McWilliams, Meriplex | Michael Leonard, VMware Modern-day healthcare organizations and physician groups have one priority on their mind: providing their patients with the best care. If your systems... 1 week ago | 37 mins Fireside Chat: Is Sovereign Cloud the Answer to Your Data Concerns? Guy Bartram - VMware, Linus Lai - IDC Asia/Pacific Cloud and cloud-centric operating models have grown to become integral components of the modern IT environment. Controlling the actual location of dat... 1 week ago | 48 mins Navigating Confidential Computing in Azure “Featuring solutions by Fortanix” Vikas Bhatia ,Head of Product, Azure ,Jess Schrater ,Global Director of Security ,Intel, Frank Yoo, Director, Fortanix Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment (TEE). Cloud nativ... 3 months ago | 64 mins How can organizations address their privacy compliance obligations? Michael Sampson, Senior Analyst at Osterman Research Privacy Compliance in the United States: Status and Progress in 2022 Webinar Series Organizations have proven more adept in protecting their own conf... 2 weeks ago | 50 mins Load more