Liz Moy

This Machine Ends Data Breaches

What if you could encrypt data even while it's being processed? Learn how Confidential Computing uses hardware-level enclaves to protect your most sensitive workloads.

This Machine Ends Data Breaches
#1about 4 minutes

Data breaches are a persistent threat for all companies

Even the largest tech companies suffer from data breaches, highlighting the need for a new approach to security like confidential computing.

#2about 5 minutes

Understanding trusted execution environments (TEEs)

A TEE is a secure, hardware-isolated enclave within a CPU that protects data while it is being processed in memory.

#3about 4 minutes

The three pillars of confidential computing

Confidential computing relies on data confidentiality, data integrity, and remote attestation to provide verifiable security for workloads.

#4about 9 minutes

How remote attestation verifies workload integrity

Attestation is a cryptographic process that proves a TEE has not been tampered with before any sensitive data is sent to it.

#5about 6 minutes

Exploring the confidential computing ecosystem

Major hardware vendors like Intel, AMD, and Nvidia, along with cloud providers, offer a growing ecosystem of TEE-enabled products and services.

#6about 5 minutes

Practical applications and use cases for TEEs

TEEs can be used to process PII, secure credentials, run private ML models, protect IP, and enable multi-party collaboration on sensitive data.

#7about 3 minutes

Demo of a secure medical imaging AI model

This demo shows how to run an ML model for brain tumor detection inside an AWS Nitro Enclave to protect both the model and patient data.

#8about 2 minutes

Demo of a secure financial lending application

A simple mortgage application demonstrates how to isolate and protect sensitive financial calculations within a TEE while integrating with a standard web app.

#9about 7 minutes

The future outlook for confidential computing

While challenges like performance, cost, and side-channel risks exist, the goal is for confidential computing to become a ubiquitous security standard.

#10about 14 minutes

Q&A on implementation, strategy, and AI's impact

The speaker answers audience questions about successful implementations, integrating confidential computing into a security strategy, and the risks of AI in cybersecurity.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.