< Back
Expanding The Trust Boundaries and Supply Chain Security
June 6, 3:00 PM - 3:30 PM
Imperial Room B
Advancements in confidential computing by AMD and other participants in the ecosystem have been significant in the last few years. There is still more to do for securing new and wider range of use cases in multi-tenant data centers. The next evolution of confidential computing technologies aims to extend the boundaries of the trusted execution environment to trusted device I/O virtualization with TDISP, workload migration, and supply chain security. This session covers these emerging technologies, identifies next set of problems to solve in confidential computing, and calls for industry action to drive their broad adoption to achieve forward-progress in building scalable & effective confidential computing solutions for AI and general workloads.
About the speakers
Sudhir Mathane
Security Architect, AMD
Sudhir is a Security Architect at AMD, with focus on design and development of hardware-assisted security engines and platform security for AMD EPYC™ CPUs. With more than 17 years of experience in the security domain, he has contributed to several patents and publications in this field. Sudhir also participates in industry groups, such as the Global Semiconductor Alliance and the Trusted Computing Group, to drive the standardization and adoption of security best practices and technologies.
Apostolos Kotsiolis
Product Marketing Manager, AMD
Apostolos Kotsiolis is a Product Marketing Manager for the AMD EPYC™ server CPUs. He brings a strong electrical and computer engineering background with a focus on computer architecture. Apostolos is currently focused on technical marketing for security and artificial intelligence.