Data Privacy Day
May 11, 2023
Debrief: AI, Data Privacy, and Confidential Access Control in RSAC 2023
As technology advances at a rapid pace, the issue of data privacy has become more crucial than ever. With AI becoming increasingly integrated into our daily lives, what steps are being taken to protect our personal privacy information?
March 18, 2023
#DataPrivacyDay: Eliminate Supply Chain Compromise with TEEs
Dr. Chase Cunningham - Dr. Zero Trust - to discuss the root causes for supply chain attacks and how we can eliminate attack surface ...
March 17, 2023
#DataPrivacyDay: HIPAA, De-Identification and Encryption
Discuss what de-identification and encryption standards to achieve HIPAA compliance.
March 15, 2023
#DataPrivacyDay: Zero Trust Meets Confidential Computing
John Kindervag – creator of the Zero Trust Model – to discuss how Zero Trust and Confidential Computing can work together...
March 9, 2023
#DataPrivacyDay: CISO’s Take on Privacy and Confidential Computing
Sit down with Rich Lindberg to discuss privacy and confidential computing from a CISO’s view.
March 8, 2023
#DataPrivacyDay: Confidential Computing in Azure - Graham Bury
Explore what confidential computing is and how it works in Microsoft Azure with Graham Burry and SafeLiShare...
March 1, 2023
#DataPrivacyDay: Confidential Computing in Esports
Confidential computing could be the answer to these security concerns in esports. By using hardware-level encryption and data isolation...
Subscribe for #DataPrivacyDay
The #DataPrivacyDay aims at educating individuals about best practices on confidential computing for protecting their personal information, data, algorithmic assets anywhere and anytime.
It also highlights the need for companies and organizations to implement strict data privacy policies, ensure secure storage of user data, practice compliant data collection methods, and safeguard against unauthorized access.
- Unlock more data for analysis, monetization and innovation
- Manage and monitor your sensitive data
- Use cases on enforced access control across secure enclaves