Confidential Computing’s Recent Past, Emerging Present, and Long-Lasting Future
Day 1 | 10:40 | 00:20 | K.4.401 | Sal Kimmich
Note: I'm reworking this at the moment, some things won't work.
As Confidential Computing (CC) continues to gain traction as a cornerstone of modern cybersecurity, understanding its trajectory—past, present, and future—is critical to its adoption and impact. This talk explores the evolution of CC, from its origins in securing sensitive workloads with Trusted Execution Environments (TEEs), to its growing intersection with broader cybersecurity disciplines such as supply chain security and threat modeling.
The session will highlight the need to effectively communicate CC's value across these disciplines, bridging technical advancements with practical applications. With the latest EU DORA directive mandating runtime data security, and the increasing need for mathematical unicity in sensitive data comparisons, the relevance of CC is more pressing than ever.
Attendees will learn:
A concise history of CC and its early drivers. Current challenges and successes in embedding CC within complex cybersecurity frameworks. Strategies for fostering adoption across diverse industries and regulatory landscapes. A forward-looking vision for CC’s role in addressing the evolving threat landscape, particularly in areas demanding high assurance of data integrity and confidentiality. Join us for a compelling narrative that positions Confidential Computing as a key enabler of secure and trustworthy systems in a rapidly changing world. Whether you’re a seasoned practitioner or new to CC, this session will provide actionable insights to integrate and advocate for CC in your security workflows.