Главная
Study mode:
on
1
Introduction
2
Agenda
3
Problem Statement
4
Security Landscape
5
Goal
6
Concerns
7
Sensitive Data
8
Hardware Assisted Virtualization
9
Integrity Protection
10
Design Principles
11
Trusted Execution Environment TEA
12
HSM
13
Trusted Protection Modules
14
Programmability
15
Use Cases
16
Confidential AI for Healthcare
17
Confidential Computing
18
Trusted Execution Environment Properties
19
Unit of Isolation
20
Programmable Te
21
Implementation Solutions
22
Trusted Execution
23
attestation flows
24
field examples
25
What is good to have
26
Combined example
27
Tee example
28
Key takeaways
29
Audience questions
30
Closing remarks
Description:
Explore the world of Confidential Computing in cloud and edge environments through this 46-minute webcast from RSA Conference. Learn about Trusted Execution Environments (TEEs) that protect code and data from modification and disclosure. Discover how this computing model is being implemented at scale in cloud and edge settings. Gain insights from industry experts Joseprabu Inbaraj and Mourad Cherfaoui as they discuss the security landscape, design principles, and use cases for Confidential Computing. Delve into topics such as hardware-assisted virtualization, integrity protection, and programmability. Examine real-world applications like Confidential AI for Healthcare and understand the properties of TEEs, including units of isolation and attestation flows. Conclude with key takeaways and audience questions to deepen your understanding of this crucial technology in modern computing environments.

Confidential Computing in Cloud and Edge

RSA Conference
Add to list
0:00 / 0:00