{"id":2205,"date":"2024-10-05T04:23:19","date_gmt":"2024-10-05T04:23:19","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=2205"},"modified":"2024-10-21T02:06:48","modified_gmt":"2024-10-21T02:06:48","slug":"check-out-the-building-privacy-enhancing-cloud-workflows-with-confidential-computing-session-with-ridwan-badmus","status":"publish","type":"post","link":"https:\/\/thecloudmarathoner.com\/index.php\/2024\/10\/05\/check-out-the-building-privacy-enhancing-cloud-workflows-with-confidential-computing-session-with-ridwan-badmus\/","title":{"rendered":"Check out the Building Privacy-Enhancing Cloud Workflows with Confidential Computing session with Ridwan Badmus"},"content":{"rendered":"\n<p>Greeting to all #Cloudmarathoners!<\/p>\n\n\n\n<p>In this first week of October, we had an interesting session to explore privacy and confidential computing from an engineering perspective.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"\/wp-content\/uploads\/2024\/10\/image-3-1024x564.png\" alt=\"\" class=\"wp-image-2211\" srcset=\"\/wp-content\/uploads\/2024\/10\/image-3-1024x564.png 1024w, \/wp-content\/uploads\/2024\/10\/image-3-300x165.png 300w, \/wp-content\/uploads\/2024\/10\/image-3-768x423.png 768w, \/wp-content\/uploads\/2024\/10\/image-3.png 1110w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">FOCUS OF THE SESSION<\/h4>\n\n\n\n<p>Our speaker focused on some hidden details of Implementing Confidential Computing, namely learn how to leverage Trusted Execution Environments (TEEs) to build secure and privacy-conscious cloud workflows. Ridwan also emphasized aligning Governance with Privacy Regulations, as well as discovering strategies to ensure your cloud governance practices comply with evolving data privacy regulations. <\/p>\n\n\n\n<p>In addition, he expanded topic with optimizing Cloud Investments by exploring how enhanced data security and minimized compliance risks can optimize outputs from your cloud investments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Thank you, Ridwan!<\/h4>\n\n\n\n<p>Ridwan Badmus is a lawyer and privacy engineer who is interested to help customers. He has legal and as well as engineering experience to help in these matters. Thus, feel free to connect with him on LinkedIn if you have any inquiries.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"422\" src=\"\/wp-content\/uploads\/2024\/10\/image-1-1024x422.png\" alt=\"\" class=\"wp-image-2209\" srcset=\"\/wp-content\/uploads\/2024\/10\/image-1-1024x422.png 1024w, \/wp-content\/uploads\/2024\/10\/image-1-300x123.png 300w, \/wp-content\/uploads\/2024\/10\/image-1-768x316.png 768w, \/wp-content\/uploads\/2024\/10\/image-1-1200x494.png 1200w, \/wp-content\/uploads\/2024\/10\/image-1.png 1273w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">what is next?<\/h4>\n\n\n\n<p>If you would like further to explore this topic then you are encouraged to check the following resources:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/overview\">https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/overview<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute#documentation\">https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute#documentation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sas.com\/en\/offers\/analytics-innovation-powered-secured-unleashed.html\">https:\/\/www.sas.com\/en\/offers\/analytics-innovation-powered-secured-unleashed.html<\/a><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"496\" src=\"\/wp-content\/uploads\/2024\/10\/image-4-1024x496.png\" alt=\"\" class=\"wp-image-2212\" srcset=\"\/wp-content\/uploads\/2024\/10\/image-4-1024x496.png 1024w, \/wp-content\/uploads\/2024\/10\/image-4-300x145.png 300w, \/wp-content\/uploads\/2024\/10\/image-4-768x372.png 768w, \/wp-content\/uploads\/2024\/10\/image-4-1200x582.png 1200w, \/wp-content\/uploads\/2024\/10\/image-4.png 1246w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Recorded Session<\/h4>\n\n\n\n<p>If you are intrigued to watch the entire session, then please visit the following YouTube link below on our Cloud Lunch and Learn channel.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Building Privacy-Enhancing Cloud Workflows with Confidential Computing\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/Pb3SOYgnr2s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2205\" class=\"pvc_stats all  \" data-element-id=\"2205\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Greeting to all #Cloudmarathoners! In this first week of October, we had an interesting session to explore privacy and confidential computing from an engineering perspective. FOCUS OF THE SESSION Our speaker focused on some hidden details of Implementing Confidential Computing, namely learn how to leverage Trusted Execution Environments (TEEs) to build secure and privacy-conscious cloud &hellip; <a href=\"https:\/\/thecloudmarathoner.com\/index.php\/2024\/10\/05\/check-out-the-building-privacy-enhancing-cloud-workflows-with-confidential-computing-session-with-ridwan-badmus\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Check out the Building Privacy-Enhancing Cloud Workflows with Confidential Computing session with Ridwan Badmus&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,1,33,15],"tags":[],"class_list":["post-2205","post","type-post","status-publish","format-standard","hentry","category-community-event","category-general","category-governance","category-security-governance"],"_links":{"self":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=2205"}],"version-history":[{"count":4,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2205\/revisions"}],"predecessor-version":[{"id":2226,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2205\/revisions\/2226"}],"wp:attachment":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=2205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=2205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=2205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}