Register for free
Save the date: March 13, 2024
The call for submissions is open! Deadline is Dec 3rd.
OC3 is the premier event for security architects, cloud-native software engineers, IT security experts, CISOs, CTOs, security researchers, and developers who want to learn about confidential computing. Whether brand new to confidential computing or an advanced user, there is something for everyone at OC3. Here are some key numbers from OC3 2023:
2
Stages
29
Sessions
37
Speakers
1
Panel Discussion
1200+
Registrants
If you are interested in sponsoring, you can find all relevant information here. If you have any additional questions, would like to become a media partner or a sponsor, please contact info@oc3.dev.
OC3 is the conference that brings together the confidential computing community. The event is hosted and organized by Edgeless Systems. Our company is built on the principles of open source, using a community-driven approach to deliver confidential computing technology. We invite experts, users, and those who are interested in the topic to share feedback and discuss the future of open-source confidential computing.
OC3 is the conference for the open-source confidential computing community. Join core committers and contributors, new and advanced users, as well as thought leaders to share experiences and best practices in confidential computing. Learn more about the latest innovations in the ecosystem, updates of current projects, and the future of this powerful technology.
Edgeless Systems is a cybersecurity startup on the mission to build easy-to-use open source tools that make confidential computing accessible to everyone. We develop innovative software that enables new and exciting forms of trustworthy data processing.
Confidential computing is an emerging technology that protects data not only at rest or in transit but also in use. A hardware-based trusted execution environment provides an isolated area, a secure enclave within a CPU, that protects sensitive data while being processed. The contents of an enclave are always encrypted throughout the data lifecycle.