Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Confidential Computing in Cloud and Edge

RSA Conference via YouTube

Overview

Explore the world of Confidential Computing in cloud and edge environments through this 46-minute webcast from RSA Conference. Learn about Trusted Execution Environments (TEEs) that protect code and data from modification and disclosure. Discover how this computing model is being implemented at scale in cloud and edge settings. Gain insights from industry experts Joseprabu Inbaraj and Mourad Cherfaoui as they discuss the security landscape, design principles, and use cases for Confidential Computing. Delve into topics such as hardware-assisted virtualization, integrity protection, and programmability. Examine real-world applications like Confidential AI for Healthcare and understand the properties of TEEs, including units of isolation and attestation flows. Conclude with key takeaways and audience questions to deepen your understanding of this crucial technology in modern computing environments.

Syllabus

Introduction
Agenda
Problem Statement
Security Landscape
Goal
Concerns
Sensitive Data
Hardware Assisted Virtualization
Integrity Protection
Design Principles
Trusted Execution Environment TEA
HSM
Trusted Protection Modules
Programmability
Use Cases
Confidential AI for Healthcare
Confidential Computing
Trusted Execution Environment Properties
Unit of Isolation
Programmable Te
Implementation Solutions
Trusted Execution
attestation flows
field examples
What is good to have
Combined example
Tee example
Key takeaways
Audience questions
Closing remarks

Taught by

RSA Conference

Reviews

Start your review of Confidential Computing in Cloud and Edge

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.