The idea of Confidential Computing has been around for some time (under various names). It enjoys increased attention recently, since PETs and other options are discussed, promoted, and evaluated to meet data protection laws and regulations around the world. In this webinar, aimed at non-technical audience, we will look at the core principles and concepts of Confidential Computing, and will explore a bit how it compares to other PETs.
If you would like to explore courses from our Academy on Data Protection, Cyber Regulation & AI Governance, please click here.
For courses on Privacy Engineering, Cybersecurity & AI Technology, please click here.