What are the use cases for confidential computing? What are the technologies—HSMs, TEEs, Homomorphic Encryption, HSMs, etc.? What industries are interested, and how do their requirements vary? How can you get whatever technology you choose into your development cycle? What about monitoring? Debugging? This is an emerging topic with many questions to be discussed. Attendance is strictly limited to allow for a small group experience.