BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Pacific
BEGIN:DAYLIGHT
DTSTART:20200308T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20201101T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20201211T055839Z
UID:F81DD6C8-C5A9-47A9-8DC7-04143F56976F
DTSTART;TZID=US/Pacific:20200813T190000
DTEND;TZID=US/Pacific:20200813T200000
DESCRIPTION:Abstract:\n\nThe increased adoption of cloud technologies in th
 e recent years in combination with privacy concerns are fueling the develo
 pment of techniques and technologies to protect the integrity and privacy 
 of the data while in use. However\, Confidential Computing is just in the 
 early days. Still\, it is already showing that it can be applied not only 
 as an enabler to assure compliance for regulated industries but also tackl
 e very hard problems such as\, privacy-preserving multi-party machine lear
 ning that is necessary for fraud prevention\, anti-money laundering to can
 cer research.\n\nIn this webinar\, you will learn about the principle tech
 niques and technologies being used in confidential computing\, some of the
  practical challenges to incorporate these capabilities into an already es
 tablished CI/CD pipeline\, the rise of the concept of DevSec[Compliance]Op
 s and how Confidential Computing is being adopted and promising use cases.
 \n\nCo-sponsored by: Michael Bates\n\nOnline Meeting\, Oregon\, United Sta
 tes
LOCATION:Online Meeting\, Oregon\, United States
ORGANIZER:aftabjahani@ieee.org
SEQUENCE:12
SUMMARY:IEEE CS Webinar: IEEE Oregon Section Technical Seminar - The Rise o
 f Confidential Computing in Regulated Industries
URL;VALUE=URI:https://events.vtools.ieee.org/m/236532
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;
 &lt;/p&gt;\n&lt;p&gt;&lt;em&gt;The increased adoption of cloud technologies in the recent ye
 ars in combination with privacy concerns are fueling the development of te
 chniques and technologies to protect the integrity and privacy of the data
  while in use. However\, Confidential Computing is just in the early days.
  Still\, it is already showing that it can be applied not only as an enabl
 er to assure compliance for regulated industries but also tackle very hard
  problems such as\, privacy-preserving multi-party machine learning that i
 s necessary for fraud prevention\, anti-money laundering to cancer researc
 h.&lt;/em&gt;&lt;/p&gt;\n&lt;p&gt;&lt;em&gt;In this webinar\, you will learn about the principle t
 echniques and technologies being used in confidential computing\, some of 
 the practical challenges to incorporate these capabilities into an already
  established CI/CD pipeline\, the rise of the concept of DevSec[Compliance
 ]Ops and how Confidential Computing is being adopted and promising use cas
 es.&lt;/em&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

