On-Demand Webinar

Securing Digital Identity and Assets with Confidential Computing

Securing identity and infrastructure, as well as fighting fraud and safeguarding digital innovation and assets, is fundamental to securing the enterprise. This cannot be accomplished by any one organization and requires a collaborative ecosystem. Federal agencies, chip vendors, cloud providers, and ISVs are all coming together to define policies and innovate.

Speakers:

PICTURE-1

Carole House

Director,
National Security Council,
The White House
PICTURE

Kay Turner

Chief Digital Identity Advisor,
FinCEN
PICTURE-2

Raghu Nambiar

Corporate VP,
AMD
PICTURE-4

Greg Woolf

Founder & CEO,
FiVerity
PICTURE-3

Ambuj Kumar

CEO
Fortanix

This webinar will give you insights into:

  • How digital identity is forming the basis for securing digital assets and infrastructure
  • President Biden’s Executive Order on Digital assets including crypto currencies, impact on Web3.0 and blockchain
  • Industry innovations across the data lifecycle
  • How fighting fraud and protecting data becomes easier with confidential computing

Fill this form to Watch Webinar

Securing identity and infrastructure, as well as fighting fraud and safeguarding digital innovation and assets, is fundamental to securing the enterprise. This cannot be accomplished by any one organization and requires a collaborative ecosystem. Federal agencies, chip vendors, cloud providers, and ISVs are all coming together to define policies and innovate.

Speakers:

PICTURE-1

Carole House

Director,
National Security Council,
The White House
PICTURE

Kay Turner

Chief Digital Identity Advisor,
FinCEN
PICTURE-2

Raghu Nambiar

Corporate VP,
AMD
PICTURE-4

Greg Woolf

Founder & CEO,
FiVerity
PICTURE-3

Ambuj Kumar

CEO
Fortanix

This webinar will give you insights into:

  • How digital identity is forming the basis for securing digital assets and infrastructure
  • President Biden’s Executive Order on Digital assets including crypto currencies, impact on Web3.0 and blockchain
  • Industry innovations across the data lifecycle
  • How fighting fraud and protecting data becomes easier with confidential computing