November 2020 Webinar

Abstract

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

In this webinar, experts from the Confidential Computing Consortium (CCC) will define Confidential Computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of Confidential Computing.

Key Topics

  • The Confidential Computing definition and comparison to related technologies
  • Key properties of Trusted Execution Environments (TEEs) to look for 
  • Threats mitigated by Confidential Computing technologies
  • Utilization paradigms: using application SDKs vs. runtime deployment systems
  • The ecosystem available to support Confidential Computing application development 
  • Common real-world use cases for Confidential Computing

Speakers

Aeva Black

Open Source Program Manager

Aeva Black is a radically queer geek and Linux user since the mid '90s who has been an advocate for Open Source since 2003. They pioneered the creation of Ironic, OpenStack's Bare Metal Cloud project while at HPE, and have contributed to projects such as MySQL, Ansible, and Kubernetes.

Read More

Dave Thaler

Technical Advisory Council Chair

Dave Thaler is a Software Architect at Microsoft, where he works on IoT security.  Dave has over 25 years of standards body experience and currently chairs the IETF group on Software Update for IoT, as well as the Confidential Computing Consortium's Technical Advisory Council. He previously served as a member of the Internet Architecture Board (IAB) for 11 years.

Read More

Mike Bursell

Chief Security Architect

Mike Bursell joined Red Hat in August 2016 in the Office of the CTO, following roles working on security, virtualisation and networking. After training in software engineering, he specialised in distributed systems and security, and has worked in architecture and technical strategy for the past few years.

Read More

Nelly Porter

Lead Product Manager

Nelly Porter is a lead Product Manager for Confidential Computing in Google Cloud with over 10 years experience in platform security, virtsec, PKI, crypto, authentication and authorization field.

Read More

Seth Knox

Outreach Committee Chair

Seth is the Vice President of Marking at Fortanix and leads the Outreach Committee for the Confidential Computing Consortium. Fortanix solves cloud security and privacy challenges, allowing customers to securely operate even the most sensitive applications without having to trust their infrastructure.

Read More

Stephen Walli

Governing Board Chair

Stephen is a principal program manager working in the Azure team at Microsoft and leads the Governing Board for the Confidential Computing Consortium. Prior to that he was a Distinguished Technologist at Hewlett Packard Enterprise.

Read More