Liz Moy
This Machine Ends Data Breaches
#1about 4 minutes
Data breaches are a persistent threat for all companies
Even the largest tech companies suffer from data breaches, highlighting the need for a new approach to security like confidential computing.
#2about 5 minutes
Understanding trusted execution environments (TEEs)
A TEE is a secure, hardware-isolated enclave within a CPU that protects data while it is being processed in memory.
#3about 4 minutes
The three pillars of confidential computing
Confidential computing relies on data confidentiality, data integrity, and remote attestation to provide verifiable security for workloads.
#4about 9 minutes
How remote attestation verifies workload integrity
Attestation is a cryptographic process that proves a TEE has not been tampered with before any sensitive data is sent to it.
#5about 6 minutes
Exploring the confidential computing ecosystem
Major hardware vendors like Intel, AMD, and Nvidia, along with cloud providers, offer a growing ecosystem of TEE-enabled products and services.
#6about 5 minutes
Practical applications and use cases for TEEs
TEEs can be used to process PII, secure credentials, run private ML models, protect IP, and enable multi-party collaboration on sensitive data.
#7about 3 minutes
Demo of a secure medical imaging AI model
This demo shows how to run an ML model for brain tumor detection inside an AWS Nitro Enclave to protect both the model and patient data.
#8about 2 minutes
Demo of a secure financial lending application
A simple mortgage application demonstrates how to isolate and protect sensitive financial calculations within a TEE while integrating with a standard web app.
#9about 7 minutes
The future outlook for confidential computing
While challenges like performance, cost, and side-channel risks exist, the goal is for confidential computing to become a ubiquitous security standard.
#10about 14 minutes
Q&A on implementation, strategy, and AI's impact
The speaker answers audience questions about successful implementations, integrating confidential computing into a security strategy, and the risks of AI in cybersecurity.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
Wilken GmbH
Ulm, Germany
Senior
Kubernetes
AI Frameworks
+3
zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Amazon Web Services (AWS)
Cloud Architecture
+1
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
03:16 MIN
The importance of client-side encryption for AI features
AI in the Open and in Browsers - Tarek Ziadé
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
04:17 MIN
Playing a game of real or fake tech headlines
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:17 MIN
Europe's push for digital independence from US tech
WeAreDevelopers LIVE – AI, Freelancing, Keeping Up with Tech and More
Featured Partners
Related Videos
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
Mingshen Sun
You can’t hack what you can’t see
Reto Kaeser
TikTok's Privacy Innovation
Mingshen Sun
Data Privacy in LLMs: Challenges and Best Practices
Aditi Godbole
WeAreDevelopers LIVE - Chrome for Sale? Comet - the upcoming perplexity browser Stealing and leaking
Chris Heilmann & Daniel Cranney & Ramona Schwering
Cyber Sleuth: Finding Hidden Connections in Cyber Data
Jennifer Reif
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
Can Machines Dream of Secure Code? Emerging AI Security Risks in LLM-driven Developer Tools
Liran Tal
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Akamai
Remote
Senior
Azure
Kubernetes
Microservices
Network Security
+2



NTT Data Deutschland SE
München, Germany
Java
DevOps
Python
Node.js
Continuous Integration

Secunet
Remote
Python
Grafana
Terraform
Kubernetes
+1


NEXT DIGITAL
Remote
Terraform
Continuous Integration
Amazon Web Services (AWS)
Scripting (Bash/Python/Go/Ruby)


Snyk's Incubation Accelerator
Charing Cross, United Kingdom
Go
Python
Node.js
Microservices
Agile Methodologies
+1