Explore how TPM 2.0 and SPIRE can be utilized to architect secure edge and hybrid systems in this informative conference talk. Delve into the capabilities of the TPM 2.0 device, a secure enclave found in most recent servers, workstations, and laptops. Learn about different types of TPMs, including virtualized options, and understand key concepts such as selectors, trust, and TPM verification. Gain insights into the threat model for CI systems and TPM policy implementation. Watch a practical demonstration showcasing the integration of TPM and SPIRE technologies. Discover future developments in this field and participate in a Q&A session to deepen your understanding of securing edge systems.