Register for free
OC3 is the world's premier event for confidential computing. The online conference is hosted by Edgeless Systems and more than 1,200 people are expected to join. Speakers and attendees include CTOs, CISOs, IT security engineers, cloud architects, and researchers. Join us on:
We're proud to present 20+ hand-picked high-quality sessions on different aspects of Confidential Computing. Sessions fall in either one of the following three main topics:
Cloud Native, Apps & Solutions, Foundations, and Attestation
OC3 is an all-online event and we'll stream 6.5h live from our studio. Most talks will be live and all will feature live Q&A. To foster discussions, many talks will also feature extended Q&A in separate virtual rooms.
The OC3 conference is going to take place on March 15, 2023, featuring a day of keynotes, technical talks, and panel discussions.
Keynotes and sessions
Access to virtual sponsor booths
OC3 is the conference that brings together the confidential computing community. The event is hosted and organized by Edgeless Systems. Our company is built on the principles of open source, using a community-driven approach to deliver confidential computing technology. We invite experts, users, and those who are interested in the topic to share feedback and discuss the future of open-source confidential computing.
OC3 is the conference for the open-source confidential computing community. Join core committers and contributors, new and advanced users, as well as thought leaders to share experiences and best practices in confidential computing. Learn more about the latest innovations in the ecosystem, updates of current projects, and the future of this powerful technology.
Edgeless Systems is a cybersecurity startup on the mission to build easy-to-use open source tools that make confidential computing accessible to everyone. We develop innovative software that enables new and exciting forms of trustworthy data processing.
Confidential computing is an emerging technology that protects data not only at rest or in transit but also in use. A hardware-based trusted execution environment provides an isolated area, a secure enclave within a CPU, that protects sensitive data while being processed. The contents of an enclave are always encrypted throughout the data lifecycle.