< Back

Expanding The Trust Boundaries and Supply Chain Security

June 6, 3:00 PM - 3:30 PM
Imperial Room B

Advancements in confidential computing by AMD and other participants in the ecosystem have been significant in the last few years. There is still more to do for securing new and wider range of use cases in multi-tenant data centers. The next evolution of confidential computing technologies aims to extend the boundaries of the trusted execution environment to trusted device I/O virtualization with TDISP, workload migration, and supply chain security. This session covers these emerging technologies, identifies next set of problems to solve in confidential computing, and calls for industry action to drive their broad adoption to achieve forward-progress in building scalable & effective confidential computing solutions for AI and general workloads.

About the speakers

Sudhir Mathane

Sudhir Mathane

Security Architect, AMD

Sudhir is a Security Architect at AMD, with focus on design and development of hardware-assisted security engines and platform security for AMD EPYC™ CPUs. With more than 17 years of experience in the security domain, he has contributed to several patents and publications in this field. Sudhir also participates in industry groups, such as the Global Semiconductor Alliance and the Trusted Computing Group, to drive the standardization and adoption of security best practices and technologies.

Apostolos Kotsiolis

Apostolos Kotsiolis

Product Marketing Manager, AMD

Apostolos Kotsiolis is a Product Marketing Manager for the AMD EPYC™ server CPUs. He brings a strong electrical and computer engineering background with a focus on computer architecture. Apostolos is currently focused on technical marketing for security and artificial intelligence.