Securing TPM Secrets in the Datacenter - Paul Moore, Microsoft & Joy Latten, Cisco
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco
Securing Kubernetes with Trusted Platform Module (TPM) - Alex Tcherniakhovski & Andrew Lytvynov
Linux & TPMs
How a TPM can increase ROI within your Data Center
Introducing TPM NV Storage with E/A Policies and TSS-FAPI - Andreas Fuchs, Fraunhofer SIT
PCA-3 Quick, GCP Professional Architect - operational security, trust boundaries, TPM
Securing Data at Rest with LUKS and NBDE | Red Hat Enterprise Linux Presents 36
Amazon Interview Strategy - CRUSH The Loop
What Is HSM in Cybersecurity? The Secret Hardware That Protects Your Data!
Ex-Google Recruiter Explains: 8 Secrets Recruiters Won’t Tell You
Hacking Hardware - Ways and tools to find out what a board is doing and influence it | Samy Kamkar
Protecting Data In-Use from Firmware and Physical Attacks
Safeguarding On-Site Edge Applications and Data with Avassa
Finally FDE - OpenStack Full Disk Encryption and Missing Pieces
Deploying SEDs in Enterprise: The Critical Steps Nobody Talks About
It's All About Trust: Secrets at the Retail Edge
Quantum Secure Key Exchange Demo
A closer look at Third Party Maintenance in the data centre (Part 1)
Protecting Sensitive Code with Encrypted Container Images on... Brandon Lum & Harshal Patil