Panel discussion - 40 minutes
Join us as we bring together renowned experts in cybersecurity regulations, supply chain challenges and confidential computing technologies to navigate the dynamic interplay of these critical domains. Evolving digital landscapes and escalating threats impose increasing pressures on organizations and individuals to adhere to shifting regulatory requirements while strengthening data and infrastructure security. This insightful session will dive into interoperability challenges to provide insights into trends, emerging issues and future opportunities.
Our experts will explore:
This interactive discussion will equip attendees with practical insights to navigate today's complex cybersecurity landscape. Developers, security professionals, decision-makers and anyone interested in the future of secure and interoperable computing are encouraged to attend. You'll gain a deeper understanding of how these critical areas intersect and learn how to navigate the intricacies of our modern cybersecurity environment.
Keynote
With Arm9 came CCA Realms, and with CCA, Confidential Computing comes to the Arm ecosystem. CCA allows Trusted Execution Environments (TEEs), providing hardware-based isolation for applications and, with attestation services, further security assurances for applications and data alike. Open source is key to Confidential Computing, and the Confidential Computing Consortium, part of the Linux Foundation curates and promotes adoption of the technology. Mike Bursell, Executive Director of the CCC, provides a quick glimpse into the possibilities offered by Confidential Computing in this fast-moving keynote.
No bio available