Confidential Computing in Action: Securing Data and AI (Case study)

Logo
Presented by

Richard Searle, Vice President, CC Solutions, Fortanix , and Glen Otero, VP of Scientific Computing at (TGen)

About this talk

Increased adoption of cloud to host data and AI models have compounded security challenges and risk to privacy since the cloud is generally considered an untrusted platform. Data encryption is a fundamental security requirement. While the importance of protecting data at rest and in transit are well known, the challenge is more on the protection of data in use. Data is often exposed while it’s processed. This vulnerability of data in use is a key concern in the secure implementation of applications such as AI modelling. How can organizations secure data in a multicloud environment, and use in AI modelling, as an example, while also preserving the privacy and compliance requirements? Confidential Computing provides the much-needed solution. Confidential computing or, the protection of algorithms as well as the data while computing will be the default requirement for data privacy and the future of AI modeming in the not too distant future. In this webinar, join Richard Searle, Vice President, Confidential Computing Solutions, Fortanix , and Glen Otero, Vice President of Scientific Computing at The Translational Genomics Research Institute (TGen) as they discuss the role of Confidential Computing in securing data and AI. The webinar will cover : -The importance and benefits of Confidential Computing in securing data and AI. -Some real-world use cases where Confidential Computing can be applied -TGEN Case Study: Securing genomic and clinical data with Confidential Computing -Fortanix Confidential Computing technology
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (67)
Subscribers (1032)
The Fortanix Data Security Expert webinar channel contains educational content related to data security topics including encryption, key management, tokenization, secure devops, and confidential computing.