• Start Time:
  • End Time:
  • Day:
    Day 2


Whether you’re building a castle or a house, a solid and secure foundation is absolutely crucial.

The strength of your security is only as strong as your weakest link, which is why a secure supply chain is of utmost importance. Any breach in the supply chain could lead to serious consequences.

Have you ever wondered about the level of security in a shared workspace? Is the network safe? Is the USB port vulnerable to hacking? This is where confidential computing becomes essential, especially since memory on a Virtual server is shared among all tenants.

Similarly, just relying on locks and hardening your workloads is not sufficient. Continuous monitoring for new threats is vital.

If any of these concerns resonate with you, this session will explore how you can minimize the attack surface, covering everything from the operating system to applications.

We will concentrate on three crucial elements of modern cybersecurity: securing the supply chain, harnessing the potential of confidential computing, and enhancing container security. Furthermore, we will demonstrate how our technology can identify, fortify, and remediate threats effectively.

Associated Speakers:

Jurriën Bloemen

Solution Architect


Associated Talks:

12:40PM - Day 2

View Presentation: How to build a “secure” house

View Full Info