- Start Time:11:55AM
- End Time:12:15PM
- Day:Day 1
- Discussing the recent changes in public cloud technology and how Confidential Computing can be used to lock-down data and create a trusted environment, even in an environment shared by other customers, open to third parties, and in a geography that is considered untrusted.
- Discovering how Enterprises can embrace the cloud and protect confidential data like PII, PHI, and more without recoding or refactoring applications.
- Examining the benefits of Confidential Computing for protecting sensitive workloads and applications.