Whitepaper: Confidential Computing for AI, MLOps and LLMOps
Logo

Data Privacy Day

Debrief: AI, Data Privacy, and Confidential Access Control in RSAC 2023

May 11, 2023

Debrief: AI, Data Privacy, and Confidential Access Control in RSAC 2023

As technology advances at a rapid pace, the issue of data privacy has become more crucial than ever. With AI becoming increasingly integrated into our daily lives, what steps are being taken to protect our personal privacy information?

#DataPrivacyDay: Eliminate Supply Chain Compromise with TEEs

March 18, 2023

#DataPrivacyDay: Eliminate Supply Chain Compromise with TEEs

Dr. Chase Cunningham - Dr. Zero Trust - to discuss the root causes for supply chain attacks and how we can eliminate attack surface ...

#DataPrivacyDay: HIPAA, De-Identification and Encryption

March 17, 2023

#DataPrivacyDay: HIPAA, De-Identification and Encryption

Discuss what de-identification and encryption standards to achieve HIPAA compliance.

#DataPrivacyDay: Zero Trust Meets Confidential Computing

March 15, 2023

#DataPrivacyDay: Zero Trust Meets Confidential Computing

John Kindervag – creator of the Zero Trust Model – to discuss how Zero Trust and Confidential Computing can work together...

#DataPrivacyDay: CISO’s Take on Privacy and Confidential Computing

March 9, 2023

#DataPrivacyDay: CISO’s Take on Privacy and Confidential Computing

Sit down with Rich Lindberg to discuss privacy and confidential computing from a CISO’s view.

#DataPrivacyDay: Confidential Computing in Azure - Graham Bury

March 8, 2023

#DataPrivacyDay: Confidential Computing in Azure - Graham Bury

Explore what confidential computing is and how it works in Microsoft Azure with Graham Burry and SafeLiShare...

#DataPrivacyDay: Confidential Computing in Esports

March 1, 2023

#DataPrivacyDay: Confidential Computing in Esports

Confidential computing could be the answer to these security concerns in esports. By using hardware-level encryption and data isolation...

Subscribe for #DataPrivacyDay

The #DataPrivacyDay aims at educating individuals about best practices on confidential computing for protecting their personal information, data, algorithmic assets anywhere and anytime.

It also highlights the need for companies and organizations to implement strict data privacy policies, ensure secure storage of user data, practice compliant data collection methods, and safeguard against unauthorized access.

  • Unlock more data for analysis, monetization and innovation
  • Manage and monitor your sensitive data
  • Use cases on enforced access control across secure enclaves