- Start Time:11:55AM
- End Time:12:15AM
- Day:Day 1
- Discussing the recent changes in AWS cloud technology and how Confidential Computing can be used to lock-down data and create a trusted environment, even in an environment shared by other customers, open to third parties, and in a geography that is considered untrusted.
- Discovering how Enterprises can embrace the AWS Cloud and protect confidential data like PII, PHI, and more without recoding or refactoring applications
- Examining the benefits of Confidential Computing for protecting sensitive workloads and applications within AWS