InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Protecting Against Public Cloud Data Breaches Using Confidential Computing

Presented by

Seth Knox, Fortanix | Dave Thaler, Microsoft

About this talk

Today, data in the public cloud is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory. In this webinar, experts from the Confidential Computing Consortium (CCC) will define confidential computing, discuss how businesses are using Confidential Computing to protect against data breaches today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of Confidential Computing. Key topics covered in the webinar include: ● The Confidential Computing definition and comparison to related technologies ● Key properties of Trusted Execution Environments (TEEs) to look for ● Threats mitigated by Confidential Computing technologies ● Utilization paradigms: using application SDKs vs. runtime deployment systems ● The ecosystem available to support Confidential Computing application development ● Common real-world use cases for Confidential Computing Seth Knox, VP of Marketing, Fortanix (Outreach Chair) (Linkedin https://www.linkedin.com/in/sethknox/, twitter @seth_knox) Dave Thaler, Software Architect, Microsoft (TAC Chair)
Information Security

Information Security

259711 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics