The Linux Foundation Projects
Skip to main content
Category

CCC Events

Guide to Confidential Computing Sessions at KubeCon + CloudNativeCon North America, Salt Lake City 2024

By Blog, CCC Events No Comments

Ready to explore the forefront of Confidential Computing (CC) at KubeCon Salt Lake City? This guide highlights the key sessions and demos to get the most out of the KubeCon Schedule, from hands-on workshops and insightful talks to live demos at the Confidential Computing Consortium (CCC) booth. Here’s your roadmap to navigating CC at KubeCon:

Must-Attend Confidential Computing Sessions at KubeCon Salt Lake City

1. Confidential Containers 101: A Hands-On Workshop

  • When: Wednesday, 14:30 – 16:00
  • Where: Level 1, Grand Ballroom G

Presented by: Microsoft
This in-depth workshop by Microsoft provides an introduction to Confidential Containers, with practical insights into container security and data privacy. Participants will learn best practices for deploying applications with Confidential Computing to address privacy and security in multi-tenant environments. Expect hands-on experience that is perfect for practitioners interested in integrating CC into their Kubernetes workloads.

2. From Silicon to Service: Ensuring Confidentiality in Serverless GPU Cloud Functions

  • When: Thursday, 11:00 – 11:35
  • Where: Level 1, Room 151 G
  • Presented by: NVIDIA
    Join NVIDIA’s session to discover how Confidential Computing powers secure serverless GPU cloud functions, ideal for supporting AI and machine learning operations with sensitive data. This talk will walk you through securing data from the silicon level up to cloud services, offering insights on GPU-optimized applications that maintain data confidentiality in the cloud. NVIDIA’s approach is essential for anyone interested in GPU-based Confidential Computing and scalable cloud AI functions.

3. Privacy in the Age of Big Compute

  • When: Friday, 16:00 – 16:35
  • Where: Level 1, Grand Ballroom A
  • Presented by: Confidential Computing Consortium
    Led by the CCC, this session dives into privacy management across massive compute environments, essential for industries with stringent data protection needs. Attendees will gain a perspective on the evolving landscape of privacy within cloud-native and confidential workloads, from regulatory challenges to innovative privacy solutions. This session is key for those looking to understand how Confidential Computing fits into large-scale compute architectures.

4. Confidential Compute Use Cases Mini Session

  • When: Wednesday, 18:00 – 18:30; Thursday, 14:30 – 16:30
  • Where: CCC Booth Q25
  • Presented by: Red Hat
    Red Hat’s mini-session offers a glimpse into real-world applications of Confidential Computing. Using case studies and practical examples, this session will highlight how organizations leverage CC for secure, private compute solutions. Perfect for those curious about real-world implementations, it’s a great chance to see how CC meets industry privacy and compliance needs.

5. Confidential Collaborative AI

  • When: Wednesday, 16:00 – 16:30
  • Where: CCC Booth Q25
  • Presented by: Ultraviolet
    This session explores how Confidential Computing enables secure, collaborative AI model sharing while safeguarding sensitive data. Ultraviolet will discuss how CC facilitates multi-organization AI collaboration without sacrificing data privacy. Attendees interested in secure, cross-partner AI projects will gain insight into CC’s applications in collaborative ML environments.

6. Protecting LLMs with Confidential Computing

  • When: Thursday, 16:30 – 17:00
  • Where: CCC Booth Q25
  • Presented by: Ultraviolet
    Ultraviolet’s talk addresses the growing need for securing large language models (LLMs) with Confidential Computing. As LLMs handle more sensitive data, securing these models from unauthorized access becomes crucial. This session is ideal for those working with AI models in regulated industries, providing strategies to ensure data protection without compromising model functionality.

CCC Booth Q25: Live Demos and Networking Opportunities

Stop by the Confidential Computing Consortium Booth Q25 for demos, mini-sessions, and networking opportunities with industry leaders. Here are some key events:

Remote Attestation with Veraison: Live Demo

  • When: Wednesday and Thursday, 10:45 – 12:45
  • Presented by: Linaro
    This live demo from Linaro showcases Veraison’s remote attestation capabilities, an essential process for verifying workload integrity within Confidential Computing environments. Attendees will witness how Veraison’s open-source solution enhances trust in CC workloads, making this a must-see demo for anyone focused on workload security.

Don’t Miss: CCC Power User Bingo Card

Get your CCC Power User Bingo Card at the CCC booth and complete activities as you participate in sessions and demos. Play along during KubeCrawl and become a CC expert when securing data in use through Confidential Computing!

Catch the Exclusive Interview with Mike Bursell at the Confidential Computing Summit 2024

By Blog, CCC Events No Comments

The Confidential Computing Summit 2024, the premier event for confidential data and AI, triumphantly returned to San Francisco this summer on June 5-6. With a larger and more comprehensive two-day conference, this year’s event brought together the brightest minds in confidential computing and privacy-preserving AI to explore emerging technologies and innovative solutions.

Did you miss the Summit? We’ve Got You Covered!

If you missed this year’s conference, don’t worry,  you can still catch the sessions including an exclusive interview with Mike Bursell, Executive Director at the Confidential Computing Consortium. Mike’s insights offer an in-depth look at the latest developments and future directions in confidential computing and privacy-preserving AI.

Learn from the Best

Hear from  industry leaders, innovators, and researchers as they delve into the cutting-edge technologies shaping the future of confidential data and analytics. Gain valuable knowledge from experts on how confidential computing is revolutionizing data security and AI applications, offering new privacy and data protection solutions.

  • Mike Bursell’s Interview: Discover his perspective on the critical role of confidential computing in safeguarding sensitive data and the future of privacy-preserving AI.
  • Conference Sessions: Explore other engaging sessions and panel discussions from the Summit to stay ahead of the curve in confidential computing technologies.

Why You Should Tune In

  • Exclusive Insights: Gain access to thought leadership from key figures in the industry.
  • Emerging Technologies: Get a front-row seat to the latest advancements and trends in confidential data and AI.
  • Networking Opportunities: Connect with fellow professionals and experts in the field.

Confidential Computing Consortium Resources

Unlocking AI for the Enterprise: Confidential Computing Summit

By Blog, CCC Events No Comments

Author: Raluca Ada Popa

With the rapid rise of generative AI and LLMs, we’re on the cusp of one of the largest technology super cycles in history; the global AI market size was already valued at $196B in 2023. However, C-suite execs and IT professionals alike cite data privacy concerns as the #1 obstacle to AI adoption for their organizations.

This is the year for confidential computing innovators and researchers, users and makers to come together, crack the code and unlock AI for the enterprise. The Confidential Computing Consortium, together with Opaque Systems, is co-hosting the Confidential Computing Summit this June with exactly that goal in mind: to expose and accelerate organizational initiatives around confidential data and AI.

Think of the Summit as our Consortium’s mission made manifest. A mega collaboration of the world’s top minds in confidential data, trustworthy AI and privacy-preserving generative AI unfolding over two days of learning and networking.

We anticipate hundreds of decision-makers and thought leaders in sectors such as financial services, insurance, telco, manufacturing, and healthcare. We have over 30 use cases lined up, selected from over 86 submissions, as well as dynamic discussions and visionary keynotes that include:

  • Mike Bursell, Executive Director, Confidential Computing Consortium
  • Raluca Ada Popa, Co-founder and President of Opaque, Associate Professor CS at UC Berkeley, and Chair of the Confidential Computing Summit
  • Anand Pashupathy, VP & GM, Security Software and Services Division, Product Assurance and Security, Intel
  • Karthik Narain, Group Chief Executive – Technology, Accenture
  • Mark Russinovich, Chief Technology Officer, Microsoft Azure
  • Nelly Porter, Director of Product Management, Google
  • Jason Clinton, Chief Information Security Officer, Anthropic
  • Sello Nevo, Director of the Meselson Center, RAND Corporation

And we’ll be delving deep into confidential computing and sensitive data – from national security to genomic epidemiology, noteworthy trends to critical best practices. You’ll learn about: 

  • Confidential Computing
  • Confidential Analytics
  • Confidential AI
  • Privacy-preserving Generative AI and LLM’s
  • Privacy Enhancing Technologies
  • Data Privacy and Compliance
  • Secure Enclaves
  • Confidential Computing Cloud Environments
  • Confidential VM’s

With two full days to roll up our sleeves, open our collars and truly dig into the opportunities and challenges, we’re excited to see where the Summit will take us and what new possibilities will emerge. Check out the full agenda here.

In case you missed it, we’re offering a discount to all of our Confidential Computing Consortium members. Register here and get 50% off with our special promo code CCC50.

CCC at Black Hat and DEF CON 2022

By Blog, CCC Events No Comments

The Confidential Computing Consortium (CCC) was present at the 25th edition of Black Hat USA and the 30th edition of DEF CON.

At Intel’s booth for Black Hat, there was a big effort towards bringing awareness to Confidential Computing, including the distribution of outreach material from the Confidential Computing Consortium, as well as sessions from Anjuna (“Confidential Computing 101”) and Fortanix (“Confidential Computing AI & Intel SGX: accelerating the use of AI/ML”).

One of the highlights of Black Hat was the responsible disclosure of the ÆPIC Leak by researchers Pietro Borrello (Sapienza University of Rome) and Andreas Kogler (Graz University of Technology) and their collaboration with Intel to mitigate the vulnerability. After their session at Black Hat, the researchers and their colleagues met with the Confidential Computing Consortium representatives and shared how they worked closely together with Intel to follow responsible vulnerability disclosure practices. Intel has provided a microcode update for processors with Intel SGX to enable support to clear buffers and mitigate potential exposure of sensitive stale data when exiting Intel SGX enclaves.

At DEF CON, the Confidential Computing Consortium was mostly present at the Crypto and Privacy Village, which provides a forum for the hacker community to share knowledge and discuss cryptography and privacy.

Community members of the Enarx project gave two talks at the Crypto and Privacy Village: “Owned or pwned? No peekin’ or tweakin’!” and “Cryptle: a secure multi-party Wordle clone with Enarx”. The talks were presented by Richard Zak, Tom Dohrman, and Nick Vidal, with assistance from Ben Fischer from Red Hat.

We would like to thank attendees and organizers of Black Hat, DEF CON, the Crypto and Privacy Village, as well as staff and members of the Confidential Computing Consortium, including representatives from Anjuna, Fortanix, Intel, Profian, and Red Hat/IBM.