This event highlighted Intel’s Software Guard Extensions (SGX) technology, which provides security at the hardware level rather than strictly through software. SGX protects applications and data as they are exposed to malicious attacks by hiding the data in secure enclave.
Intel demonstrated their SGX proof of concept with the EFB in regard to memory security, lost device security, and exploit security. Teams developed potential use case scenarios centered on the human experience with SGX or like technology.
The use cases with the most votes were expanded upon into strategy boards to include a brief future vision, potential barriers to that vision, and a suggested way ahead.
Remote Date Destruct: A System Administrator needs a way to ensure data on lost devices is secure from unauthorized access because data contains PII and PHI and some devices may not have full disk encryption.
Multi-Level Single-System C2: C2 elements need a better way to process multiple levels of data on fewer systems in a secure manner so that they can collaborate more effectively with fewer systems and data leaks.
PII Protection Parameters: System Administrator needs a way to ensure data on lost devices is secure from unauthorized access because data contains PII and PHI and some devices may not have full disk encryption.
Airmen’s Any Device: A teleworker needs to complete work with appropriate access to work data so that they would have a secure work space in any location.
Single Joint Access Point: A multi-national partner needs a way to securely control who can see what information for “Mission Partner Networking” without having to have numerous single-use networks.