webinar register page

Confidential Computing: Protecting Applications and Data In Use
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

In this webinar, experts from the Confidential Computing Consortium (CCC) will define confidential computing, discuss how businesses are using confidential computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:
-The Confidential Computing definition and comparison to related technologies
-Key properties of Trusted Execution Environments (TEEs) to look for
-Threats mitigated by Confidential Computing technologies
-Utilization paradigms: using application SDKs vs. runtime deployment systems
-The ecosystem available to support confidential computing application development
-Common real-world use cases for Confidential Computing

Nov 10, 2020 08:30 AM in Pacific Time (US and Canada)

Webinar is over, you cannot register now. If you have any questions, please contact Webinar host: CCC Technical Advisory Counsel.