CCC Webinar - Confidential Computing: Protecting Applications and Data in Use


Radhika Jandhyala
 

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://confidentialcomputing.io/webinar/<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&data=04%7C01%7Csimon.leet%40microsoft.com%7Ce0b5fbe9e26b411afa5a08d87d1e9bd6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637396918777550573%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=KTDsLoK7BcmOxt%2BdrPwqCnLyFUVWBQSs9j2Udq41Rgs%3D&reserved=0>

Agenda: https://docs.google.com/document/d/1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70/edit?usp=sharing<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&data=04%7C01%7Csimon.leet%40microsoft.com%7Ce0b5fbe9e26b411afa5a08d87d1e9bd6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637396918777570478%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=Q3zUyZkJrehuPCz%2BlwYDf%2FGv1BGjzRPXBmFBkiYstS4%3D&reserved=0>

Thanks,
Radhika


Nicolae Paladi
 

Hi Radhika,
thank you for the invite;
The registration link seems to be broken, I get a 404.
The link for the agenda is fine.

Best regards,
Nicolae

On 3 Nov 2020, at 23:48, Radhika Jandhyala via lists.confidentialcomputing.io <radhikaj=microsoft.com@lists.confidentialcomputing.io> wrote:

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://confidentialcomputing.io/webinar/<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&data=04%7C01%7Csimon.leet%40microsoft.com%7Ce0b5fbe9e26b411afa5a08d87d1e9bd6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637396918777550573%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=KTDsLoK7BcmOxt%2BdrPwqCnLyFUVWBQSs9j2Udq41Rgs%3D&reserved=0>

Agenda: https://docs.google.com/document/d/1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70/edit?usp=sharing<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&data=04%7C01%7Csimon.leet%40microsoft.com%7Ce0b5fbe9e26b411afa5a08d87d1e9bd6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637396918777570478%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=Q3zUyZkJrehuPCz%2BlwYDf%2FGv1BGjzRPXBmFBkiYstS4%3D&reserved=0>

Thanks,
Radhika







Dave Thaler
 

The registration link in Radhika's email works for me, again it should be https://confidentialcomputing.io/webinar/

-----Original Message-----
From: oesdk@lists.confidentialcomputing.io <oesdk@lists.confidentialcomputing.io> On Behalf Of Nicolae Paladi via lists.confidentialcomputing.io
Sent: Wednesday, November 4, 2020 1:53 AM
To: oesdk@lists.confidentialcomputing.io; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: Re: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Hi Radhika,
thank you for the invite;
The registration link seems to be broken, I get a 404.
The link for the agenda is fine.

Best regards,
Nicolae

On 3 Nov 2020, at 23:48, Radhika Jandhyala via lists.confidentialcomputing.io <radhikaj=microsoft.com@lists.confidentialcomputing.io> wrote:

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=OGRjZeexXCNVBwfYQw0P7tUqg9sa2Z9PMI%2F26hW0Kno%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=OGRjZeexXCNVBwfYQw0P7tUqg9sa2Z9PMI%2F26hW0Kno%3D&amp;reserved=0>

Agenda: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=1V%2FQI4G0Kie%2Fj7lHmgGwGaR%2FfIG6E3UeQn3yxMHzkgE%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=1V%2FQI4G0Kie%2Fj7lHmgGwGaR%2FfIG6E3UeQn3yxMHzkgE%3D&amp;reserved=0>

Thanks,
Radhika







Radhika Jandhyala
 

Thanks Dave and Nicolae.

I am pasting the summary below:

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

In this webinar, experts from the Confidential Computing Consortium (CCC) will define confidential computing, discuss how businesses are using confidential computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:
--------------------------------------------------------
The Confidential Computing definition and comparison to related technologies
Key properties of Trusted Execution Environments (TEEs) to look for
Threats mitigated by Confidential Computing technologies
Utilization paradigms: using application SDKs vs. runtime deployment systems
The ecosystem available to support confidential computing application development
Common real-world use cases for Confidential Computing

Speakers:
-------------
Moderator - Seth Knox, VP of Marketing, Fortanix (Outreach Chair)
Intro to CCC - Stephen Walli, Principal Program Manager, Microsoft (Board Chair)
CC Key Properties - Dave Thaler, Software Architect, Microsoft (TAC Chair)
Threats Mitigated - Mike Bursell, Chief Security Architect, Red Hat
Ecosystem - Aeva Black, Open Source Program Manager, Microsoft
Use Cases - Nelly Porter, Lead Product Manager, Google

-----Original Message-----
From: Dave Thaler <dthaler@microsoft.com>
Sent: Wednesday, November 4, 2020 10:36 AM
To: oesdk@lists.confidentialcomputing.io; nicolae@canarybit.eu; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: RE: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

The registration link in Radhika's email works for me, again it should be https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0

-----Original Message-----
From: oesdk@lists.confidentialcomputing.io <oesdk@lists.confidentialcomputing.io> On Behalf Of Nicolae Paladi via lists.confidentialcomputing.io
Sent: Wednesday, November 4, 2020 1:53 AM
To: oesdk@lists.confidentialcomputing.io; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: Re: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Hi Radhika,
thank you for the invite;
The registration link seems to be broken, I get a 404.
The link for the agenda is fine.

Best regards,
Nicolae

On 3 Nov 2020, at 23:48, Radhika Jandhyala via lists.confidentialcomputing.io <radhikaj=microsoft.com@lists.confidentialcomputing.io> wrote:

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0>

Agenda: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=8F%2Bsy%2BKmi2CsLl2Rv5lzhf5jaqfTBFaS4IUQcO4L%2BUw%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=8F%2Bsy%2BKmi2CsLl2Rv5lzhf5jaqfTBFaS4IUQcO4L%2BUw%3D&amp;reserved=0>

Thanks,
Radhika