What if you could encrypt data even while it's being processed? Learn how Confidential Computing uses hardware-level enclaves to protect your most sensitive workloads.
#1about 4 minutes
Data breaches are a persistent threat for all companies
Even the largest tech companies suffer from data breaches, highlighting the need for a new approach to security like confidential computing.
A TEE is a secure, hardware-isolated enclave within a CPU that protects data while it is being processed in memory.
#3about 4 minutes
The three pillars of confidential computing
Confidential computing relies on data confidentiality, data integrity, and remote attestation to provide verifiable security for workloads.
#4about 9 minutes
How remote attestation verifies workload integrity
Attestation is a cryptographic process that proves a TEE has not been tampered with before any sensitive data is sent to it.
#5about 6 minutes
Exploring the confidential computing ecosystem
Major hardware vendors like Intel, AMD, and Nvidia, along with cloud providers, offer a growing ecosystem of TEE-enabled products and services.
#6about 5 minutes
Practical applications and use cases for TEEs
TEEs can be used to process PII, secure credentials, run private ML models, protect IP, and enable multi-party collaboration on sensitive data.
#7about 3 minutes
Demo of a secure medical imaging AI model
This demo shows how to run an ML model for brain tumor detection inside an AWS Nitro Enclave to protect both the model and patient data.
#8about 2 minutes
Demo of a secure financial lending application
A simple mortgage application demonstrates how to isolate and protect sensitive financial calculations within a TEE while integrating with a standard web app.
#9about 7 minutes
The future outlook for confidential computing
While challenges like performance, cost, and side-channel risks exist, the goal is for confidential computing to become a ubiquitous security standard.
#10about 14 minutes
Q&A on implementation, strategy, and AI's impact
The speaker answers audience questions about successful implementations, integrating confidential computing into a security strategy, and the risks of AI in cybersecurity.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
05:03 MIN
Understanding confidential computing and trusted execution environments
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
02:16 MIN
How trusted execution environments enable secure collaboration
TikTok's Privacy Innovation
01:47 MIN
Building trusted environments for responsible AI
Bringing AI Everywhere
04:35 MIN
A solution combining serverless and confidential computing
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
01:54 MIN
Learnings and future roadmap for the platform
TikTok's Privacy Innovation
02:41 MIN
Limitations of existing data privacy solutions
TikTok's Privacy Innovation
01:35 MIN
Summary of the data protection architecture
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
02:28 MIN
Key takeaways on IDE and developer tool security
You click, you lose: a practical look at VSCode's security
Dev Digest 129 - Now that's what I call private data!News and ArticlesAfter declaring Google a monopoly there are now considerations to force it to break up - isn't that what the whole Alphabet thing was about? In the last act of Crowdstrike coverage here, they released a deep analysis of the outage th...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Chris Heilmann
Dev Digest 134 - Where pixels sing?News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Chris Heilmann
Dev Digest 112 - The True Crime of AI DevelopmentIn last Friday's Dev Digest, we had some great AI news, some worrying security threats and a swipe-aware game in CSS with explanations! News and ArticlesLet's kick off with some AI news. Netflix caused a stir with AI-generated images in a true crime ...
From learning to earning
Jobs that call for the skills explored in this talk.