Close

Trust No One

(1AK)

Stream: Virtual Room 1
Time: 15:30 - 16:30


Presentation

With traditional encryption, sensitive data is encrypted, stored or transmitted, then decrypted for use. The data remains protected while it is encrypted but loses that protection when it's in use. What if you could encrypt sensitive data and make use of the data without ever decrypting it? Welcome to fully homomorphic encryption!

Join this session for a live demo and discussion of fully homomorphic encryption
- Examine encryption use cases
- Discuss the benefits and challenges of traditional encryption
- Introduce fully homomorphic encryption
- Learn how to get started using homomorphic encryption


Attachments

1AK Attachments

Speakers


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio.  Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 17 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.


    Feedback

    Click here to give some Feedback so we can make it even better next year!