Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(36 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Hvordan verdens beste Sikkerhetsrådgivere jobber ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TID:'''&nbsp; 30. november 2021, kl. 14:00<br />'''STED:'''&nbsp;  Auditorium Smalltalk, IFI/UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B Se kart].<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
Enkel servering.<br />
+
All interested are welcome. Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
Kl. 14:00 Velkommen til IFI og AF''Sikkerhet''<br />Kl. 14:15 Foredrag<br />
+
14:00h Welcome to AFSecurity at UiO <br />
* TITTEL: ''Hvordan jobber verdens beste Sikkerhetsrådgivere og hva skal vi med dem?''<br /> &nbsp;
+
14:15h Invited talk<br />
* FOREDRAGSHOLDER: [https://www.linkedin.com/in/katstathopoulou/?originalSubdomain=no Kjersti Stathopoulou], Deloitte
+
* TITLE: ''Confidential Computing'' &nbsp;
| <center>[[File:Photo-Kjersti-Stathopoulou.jpg|140px|link=https://www.linkedin.com/in/katstathopoulou/?originalSubdomain=no]]</center>
+
* SPEAKER: Ijlal Loutfi, Canonical 
| <center>[[File:Logo-Deloitte.png|200px|link=https://www2.deloitte.com/no/no.html]]</center>
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* INGRESS:<br />Tradisjonelt tenker man på Cybersikkerhet ekspertise som ett teknisk fagfelt, og det har også vært egne, kanskje noe adskilte og isolerte miljøer fra resten av virksomheten. På grunn av økt trusselbildet har Cybersikkerhet gått fra å være noe som skjer litt på utsiden av organisasjonen til noe som er sentralt i alt man gjør for å redusere risiko for Cyberangrep.<br /><br />Hvordan jobber verdens beste sikkerhetsrådgivere med å få alle med og særlig de som sikter på makta og pengene? Bli med på en reise inn i konsernledelse og styret, inn i en verden der ingen skjønner en puck av ord som SIEM, APT, IDS, IPS, IAM osv.<br /><br />
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
Kl.15 Diskusjon.
 
  
'''BIO:''' &nbsp; ''Kjersti A. Thrane Stathopoulou'', Partner og leder av cyberteamet i Norge og Norden i Deloitte
+
<br />15:00h Discussion<br />
  
Kjersti er en erfaren teknologileder med over 20 års erfaring innen IT og sikkerhet og hun er i dag sikkerhetsrådgiver for noen av de største private og offentlige virksomhetene i Norge. Hun bistår virksomheter med risikoreduksjon før hendelser, men også under og etter cyberangrep.
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
Hun var tidligere 11 år i Telenor Group og jobbet med strategi, tjenester og tjenesteutvikling. I 4 av disse årene jobbet hun i Telenor Group Business Security for Chief Security Officer som har ansvaret for å redusere Cyber risiko for Telenor globalt.  Kjersti ble partner i Deloitte i Norge juni 2020, og der leder hun cyberteamet i Norge og også i Norden.
+
 
 
 
Kjersti ble utnevnt som en av «Norges 50 fremste teknologikvinne» i 2020.
 
 
<br /><br />
 
<br /><br />
  
Line 27: Line 25:
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 14:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png