Secure and Private Compute Summit: Security Throughout the Data Lifecycle.

Data security, privacy and regulatory concerns are generally more concerned with data in transit and at rest. But what about data in use? How fast a company moves to the cloud, the quality of AI development, and the ability to collaborate on sensitive data whilst it is being worked makes data security more complex. According to a Gartner 2021 report, “By 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments or multiparty data analytics use cases”

The Secure & Private Compute Summit, July 6-8th. will cover new confidential computing and privacy preserving technologies focused protecting data in use. These technologies will enable organizations to adhere to data protection regulations and unlock the power of your sensitive data at a viable cost. Sessions include:

  • How Privacy Preserving Technologies are Empowering Open Banking Through the Mastercard Digital Identity System; with Bob Schukai, Executive Vice President, Technology Development, Fintech & New Infrastructure, Mastercard
  • Avoiding Data Protection Legislation Penalties Through Using Confidential Computing and Privacy Preserving Technologies; with Pulkit Vohra, Data Protection Officer, BT
  • Cost-Benefit Analysis of the Privacy Preserving and Confidential Computing Technologies; with Juan Ramón Troncoso-Pastoriza, Senior Researcher, EPFL (Ecole Polytechnique Fédérale de Lausanne); Shoumeng Yan, Director of Confidential Computing, and Senior Staff Engineer, Ant Financial; Suraj Kapa, Medical Director, AI for Knowledge Management and Delivery, Mayo Clinic
  • Introducing the Confidential Public Cloud – Closing the Final Security Gap in the Data Lifecycle; with Tom Rondeau, Program Manager, DARPA (Defense Advanced Research Projects Agency); V K Cody Bumgardner, Division Chief for Pathology Informatics, University of Kentucky; Christine Huang, Sr. Expert in Data Privacy and Protection, SAP
Related:   Are you a “Rebel” or a “Collector” CISO?

View the full agenda here.

Upon leaving this event you will be able to close this final security gap in the data lifecycle and be connected with the best confidential computing and privacy preserving technologies that solve your data security and privacy challenges. This year we are delighted to be partnering with

Thanks to the sponsorship of Duality, Enveil, Decentriq, R3, and Anjuna, this event is completely free to attend, Book your complimentary pass here.

To find out more, visit www.secureandprivatecompute.com

Leave a Reply

Your email address will not be published. Required fields are marked *