Mitigating Security Risks with Confidential Computing webinar

Watch Intel and IDC in an on demand webinar that explores how organizations can achieve security and privacy compliance with confidential computing.

Register to watch the webinar on demand

According to IDC research, business leaders are under constant pressure to protect businesses from sophisticated cyber threats and keep them compliant with evolving data privacy regulations. While traditional data encryption helps protect sensitive and private data in storage and during transmission, data may still be unencrypted while in use.

In this webinar, a guest speaker from IDC and Intel discuss:

  • Using trusted execution environments to help safeguard data in use
  • Protecting sensitive workloads from unauthorized access
  • Adding security and privacy compliance for data sovereignty
  • How technology business leaders use confidential computing to unlock new business opportunities
Error: Please enter a first name.
Error: First name must be at least 2 characters long.
Error: First name must be less than 250 characters long.
Error: Please enter a first name.
Error: Please enter a last name.
Error: Last name must be at least 2 characters long.
Error: Last name must be less than 250 characters long.
Error: Please enter a last name.
Error: Please enter an email address.
Error: Please enter a valid email address.
Error: Email Address must be less than 250 characters.
Error: Please select a country/region.
Error:
Your registration cannot proceed. The materials on this site are subject to U.S. and other applicable export control laws and are not accessible from all locations.
Error: Please select a profession.
Error: Please enter a company name.
Error: Company name must be at least 2 characters long.
Error: Company name must be less than 250 characters long.
Error: Please enter a company name.
Error: Please select a response.
Error: Please select a response.

Intel strives to provide you with a great, personalized experience, and your data helps us to accomplish this.

Error: Above consent required for submission.
Error: Above consent required for submission.

By submitting this form, you are confirming you are age 18 years or older. Intel may contact you for marketing-related communications. You can opt out at any time. To learn more about Intel's practices, including how to manage your preferences and settings, visit Intel's Privacy Notice.

By submitting this form, you are confirming you are age 18 years or older. Intel will process your Personal Data for the purpose of this business request. To learn more about Intel's practices, including how to manage your preferences and settings, visit Intel's Privacy Notice.

By submitting this form, you are confirming you are age 18 years or older. Intel may contact you for marketing-related communications. You can opt out at any time. To learn more about Intel's practices, including how to manage your preferences and settings, visit Intel's Privacy Notice.

Speakers



Jesse Schrater

Intel Principal Engineer, Confidential Computing Practice Lead with over 30 years of experience in Information Technology.



Ashish Nadkami

Group Vice President and General Manager within IDC's worldwide infrastructure research organization.



Barbara Call

Global Director, Content Strategy at Foundry with over 20+ years of strategic content and digital marketing skills.