Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about implementing Zero Trust Architecture for AI workloads on edge computing through this technical conference talk that explores how Intel TDX technology protects AI models, parameters, and customer data. Discover the fundamental principles of validating every user and device attempting to access network resources, regardless of location, while focusing on safeguarding against three key entities: vendors, cloud service providers, and prompt requesters. Explore how hardware-based isolation and security features create an environment where trust is never assumed and every access attempt undergoes thorough verification and authentication, establishing robust protection against potential vulnerabilities and data breaches in edge computing scenarios.
Syllabus
Zero Trust Architecture for AI Workload on Edge - Wenhui Zhang, Bytedance & Ken Lu, Intel
Taught by
LF Networking