What role does hardware play in confidential computing? With so many different technologies for security, it’s easy to get mixed up in the jargon. This panel discussion with experts from Arm and Intel explores how a hardware root of trust provides the foundation for the next generation of security. Our panelists will discuss confidential computing use cases and explain how different techniques offer a new level of protection for data and code in use, as well as at rest and in transit. We’ll define common industry terms and help demystify technologies associated with confidential computing. Join this webinar to learn how hardware enables confidential computing and the steps your organization should take now to take advantage of these new capabilities.
The Hard Facts About Confidential Computing: Understanding Hardware’s Role in Delivering a New Level of Data Security
Abstract
Speakers
Linda Popky
Strategic Alliances, Anjuna Security
Linda Popky is an award-winning Silicon Valley-based marketing expert who helps organizations stand out above the noise in the marketplace. In addition to Anjuna Security, her clients include NetApp, SAP, Cisco, Autodesk, PayPal, Sun Microsystems, and others. Her experience includes managing market development, product marketing, market intelligence, developer and channel programs, strategic alliances, sales enablement, Go To Market programs, and customer loyalty programs. She is the author of Marketing Above the Noise: Achieve Strategic Advantage with Marketing That Matters, and has been named one of Silicon Valley’s Top 100 Women of Influence.
Linda Popky is an award-winning Silicon Valley-based marketing expert who helps organizations stand out above the noise in the marketplace. In addition to Anjuna Security, her clients include NetApp, SAP, Cisco, Autodesk, PayPal, Sun Microsystems, and others. Her experience includes managing market development, product marketing, market intelligence, developer and channel programs, strategic alliances, sales enablement, Go To Market programs, and customer loyalty programs.
She is the author of Marketing Above the Noise: Achieve Strategic Advantage with Marketing That Matters, and has been named one of Silicon Valley’s Top 100 Women of Influence.
Mark Knight
Director of Product Management, Arm
Mark has worked for more than 30 years in the development of technology products, with over 20 years specializing in security and cryptography. Before joining Arm, he held product management responsibility for security products at nCipher, Thales, Microsoft and Grosvenor Technology. At Arm, Mark is a Director of Product Management within Arm’s Architecture & Technology group, where he’s responsible for security architectures, including the Arm Confidential Compute Architecture announced in March 2021 as part of Armv9-A.
Mark has worked for more than 30 years in the development of technology products, with over 20 years specializing in security and cryptography. Before joining Arm, he held product management responsibility for security products at nCipher, Thales, Microsoft and Grosvenor Technology.
At Arm, Mark is a Director of Product Management within Arm’s Architecture & Technology group, where he’s responsible for security architectures, including the Arm Confidential Compute Architecture announced in March 2021 as part of Armv9-A.
Mike Ferron-Jones
Director, Data Center Security Marketing, Intel
Mike is a technology industry veteran with 30-years’ experience in data center and client segments. He is responsible for customer engagement and go-to-market on confidential computing, crypto acceleration and infrastructure integrity technologies on Intel Xeon platforms.
Mike is a technology industry veteran with 30-years’ experience in data center and client segments. He is responsible for customer engagement and go-to-market on confidential computing, crypto acceleration and infrastructure integrity technologies on Intel Xeon platforms.