Here are some of the highlights from Confidential Computing Summit 2024. To view all sessions, visit our conference playlist.
We’re looking for real-world use cases, success stories, and lessons learned in confidential computing, generative AI and open source. Whether you’ve developed new methods to safeguard data or are advancing what's possible in the generative AI era, we want to hear from you.
Submit your talk before March 7, 2025.
Here are some of the highlights from Confidential Computing Summit 2024. To view all sessions, visit our conference playlist.
This keynote delivers welcome remarks including some exciting statistics about this year's summit. It then overviews the capabilities of the confidential computing technology when compared to other technologies. Stay tuned for a small surprise as well!
Download SlidesThe Confidential Computing Consortium (CCC) plays a crucial role in promoting and advancing the field of confidential computing. This keynote delves into the recent activities of the CCC, highlights its open-source projects and members, and outlines upcoming plans. From this talk, you'll gain insights into how these developments can benefit you and your organization.
Download SlidesConfidential Computing (CC) is reshaping the future of cloud security by extending data protection to computation. This paradigm shift not only fortifies defenses against cyber threats but also fuels innovation, empowering businesses to explore new possibilities. Join us on a journey to uncover the transformative potential of CC and forge a future that is both secure and innovative, especially in the era of generative AI.
Download SlidesGenerative AI is being embraced by companies across industries as the #1 lever for reinvention. But it's also introducing new risks in the form of data privacy, bias & explainability and security. As companies move from discrete use cases to larger-scale implementations, new risks are surfacing—from model disruption to data and IP confidentiality and protection. Your data is becoming more powerful and more vulnerable, all at once, and most companies simply aren't prepared. When all data could be accessible by AI, confidential computing is more important than ever—and companies need to scale it fast. Join me to learn valuable tips and strategies for scaling confidential computing and accelerating gen AI innovation. I'll discuss practical steps for integrating confidential computing as a standard practice.
More than another layer of security, confidential computing is a business enabler. Use it to unlock data silos, confidentially share data and monetize insights, deploy workloads in the cloud or remote locations with assurance, and reduce the time and effort spent on data sanitization. These aren't pipe dreams. We'll share stories of enterprises already deploying at scale and how they've realized new revenue streams, reduced CapEx and OpEx, and achieved expanded reach while remaining compliant, confidential, and protected.
Download SlidesAs AI's potential reshapes the world, the need to secure sensitive training data and AI models becomes paramount. Join this session to see Confidential Computing and AI in action!
The most highly-scaled AI companies, through the Frontier Model Forum, have increasingly focused on ensuring safe and responsible development of frontier AI models. In Anthropic's approach to this, the Responsible Scaling Policy, AI Safety Level 4 systems are defined as those that will present critical catastrophic misuse risk such as becoming the primary source of a national security risk in one area (such as cyberattacks or biological weapons). Such AI systems should be defended from exfiltration and abuse by motivated nation state attackers. This talk will cover early thoughts on defining ASL-4 security hardening including the utilization of confidential computing for training and inference.
Download SlidesWith GenAI's unprecedented capabilities and wide adoption come challenges and risks in ensuring responsible use. This session will discuss the various challenges and issues in ensuring trustworthy GenAI, including hallucination, privacy leakage, adversarial robustness, harmlessness, and alignment. It will also explore the potential solution space in addressing these issues and defending against the misuse of GenAI technology.
Download SlidesFrontier AI systems are rapidly becoming more capable. AI model weights are a critical component to secure - they are the culmination of significant computing, training data (trillions of tokens), and algorithmic insights and optimizations. Their security is already a matter of increasing commercial interest, but depending on their future performance on hard-to-predict tasks (such as assistance in the development of bioweapons) their security could suddenly become a matter of national security. In this talk, we'll discuss potential future security needs for frontier AI, what labs can do today to prepare, and how confidential computing fits into the picture.
Generative AI is changing the world in spectacular ways, most of which we have yet to experience. One significant barrier to its widespread adoption is the concern over the exposure or leakage to the LLM providers and outside parties of confidential/proprietary prompts and data during fine-tuning, as well as integrity concerns over the trustworthiness of the results. At the same time, enabling the power of generative AI to be used on user everyday personal data or enterprise data can bring unprecedented productivity. In this panel, industry experts leading confidential computing and/or secure AI will discuss the exciting opportunities, and associated challenges, with using confidential computing for generative AI.
Confidential computing is a critical technology for protecting data used in artificial intelligence (AI) applications. In this keynote, Mark Papermaster, EVP and CTO of AMD will share the AMD vision and strategy for delivering confidential AI solutions to the market. He'll discuss how AMD Infinity Guard technology in AMD EPYC™ CPUs, deployed on multiple cloud platforms, enables confidential AI today and how the next evolution of AMD Infinity Guard will expand the trust boundaries to include endpoints like AI accelerators. He'll also highlight the role of ecosystem collaboration and open standards in advancing confidential AI for the industry.
Download SlidesJoin Jeremiah Owyang, General Partner at Blitzscaling Ventures, as he guides attendees through the layers of the AI technology stack. This presentation will demystify the components that power AI applications and highlight the role of exclusive data. Jeremiah will discuss how leveraging unique datasets can provide an advantage, accelerating growth and impact of startups, corporations, and organizations in the AI landscape. Explore how exclusive data serves as a cornerstone for innovation and success in the AI industry. Whether you're a founder, strategist, or enthusiast, this talk will equip you with the knowledge to harness AI technologies for your ventures. Originally written by organic Jeremiah, with editing by GPT4.
Download SlidesOrganized by Opaque
© 2024 Opaque Systems, Inc. All rights reserved. | Opaque, The Confidential AI CompanyTM | Privacy Policy | Terms of Service