Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Appearances / Intel Presents at Security Field Day 6

Intel Presents at Security Field Day 6



Security Field Day 6

Ido Amidi Presented at Security Field Day

This Presentation date is October 21, 2021 at 8:00-10:00.

Presenters: Ambuj Kumar, Geoff Cooper, Jesse Schrater, Mark Sadler, Richard Kerslake, Ziv Tsarfati


Follow on Twitter using the following hashtags or usernames: #XFD6

Confidential Computing with Intel & Fortanix


Watch on YouTube
Watch on Vimeo

The intersection of data transformation and emerging cybersecurity threats is driving a massive up-tick in regulations and the need for real protections for maintaining the confidentiality and integrity of data. Confidential Computing addresses this next frontier by protecting code and data while being processed in memory, especially applicable for sensitive workloads and Multi-party Compute scenarios across Healthcare, Financial Services, Government, Public Cloud. Enabled by hardware and optimized by software, Intel and Fortanix are leading the way with proven and deployed solutions. For more information, visit http://www.intel.lv/Intel-Fortanix

Personnel: Ambuj Kumar, Jesse Schrater

Intel How Ethical Facial Recognition Can Identify Security Threats in Real Time


Watch on YouTube
Watch on Vimeo

Facial recognition offers tremendous benefits to businesses and society when used effectively and responsibly. It’s a convenient way to unlock your phone or enter your office space, but it’s becoming more controversial. As with any new technology, valid questions have been raised and concerns voiced about facial recognition’s application and shortcomings.

In this session, AnyVision will showcase its ground-breaking technology and demonstrate how ethical facial recognition is being used today by modern enterprises for watchlist alerting — identifying security threats and VIPs in real-time by comparing pictures from live video streams against a defined list of “”persons of interest.”” This same technology is also fueling a revolution in touchless access control to open guarded points of entry with biometric-based, friction-free authorization. AnyVision is working closely with Intel utilizing Intel® Distribution of OpenVINO™ toolkit to unlock advanced vision capabilities and ease budgetary strains for enterprise customers.

Personnel: Mark Sadler, Ziv Tsarfati

Intel FIDO Device Onboard (FDO)


Watch on YouTube
Watch on Vimeo

Onboarding and provisioning of IOT devices is the first critical step in the deployment of new industrial or enterprise systems. Currently this is often handled manually – an approach that is expensive, time consuming and insecure. A new industry standard – FIDO Device Onboard is now available to specifically address these challenges by offering an automated and more secure approach. In this paper we will review the onboarding challenge, discuss how FDO works and talk about open source software implementations available that implement FDO.

Personnel: Geoff Cooper, Richard Kerslake


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Compliance Does Not Equal Security
  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks
  • Exploring the Future of Cybersecurity at Security Field Day 13
  • 5G Neutral Host: Solving Enterprise Cellular Coverage Gaps
  • Qlik Connect 2025: Answers For Agentic AI

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in