Skip to content

Secure your enterprise with confidential computing

Photo of Phillip Wilson
Hosted By
Phillip W.
Secure your enterprise with confidential computing

Details

This webinar will feature the topics of Confidential Computing, Quantum-Safe, and DORA. All three are disrupting the security market and shaping the future of client security strategies. Start your journey now! Join us to learn:

  • How confidential computing can help your security strategy
  • Why it's important to prepare now with Quantum-Safe
  • How these topics can help you meet DORA compliance regulations
  • Directly from a client on how they are using these technologies

Speakers:
Anne Dames |Distinguished Engineer, Cryptographic Technology Development, IBM

Robert Enochs |Principal Product Manager, IBM Z Security

Reinhard Bündgen |STSM, Chief Architect Confidential Computing and Crypto/Security Enablement for IBM Z/ LinuxONE

Sadie Revercomb |Go-To-Market Offering Manager for IBM Hyper Protect Services

Photo of Southeast Opensource for IBM Z Meetup Group group
Southeast Opensource for IBM Z Meetup Group
See more events