Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo International Forum B

Demystify Confidential Computing-Game Changer in the world of Privacy & Security

Confidential Computing can be a game changer in the world of securing your sensitive data without compromising security or privacy.

calendar_today Wed, 26.10.2022, 16:30 - 16:45

event_available Hybrid

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Data protection / GDPR Data security / DLP / Know-how protection Legislation, standards, regulations Governance, Riskmanagement and Compliance Data Center

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Confidential Computing uses a hardware-based Trusted Execution Environment (TEE) to protect data and applications in-use.

By securing data when it is being processed, Confidential Computing can protect private data on untrusted infrastructure and prevent unauthorized access to sensitive workloads.

Now available to deploy at scale with public cloud providers and OEM hardware manufacturers, Confidential Computing represents a game-changing privacy enhancing technology that enables collaborative data processing, without compromising data privacy requirements.

This session will describe how Confidential Computing works and how it is being used within a range of different industry use-cases covering healthcare, financial services and defense applications.

... read more

Downloads

Language: English

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.