OC3 2026 will be a hybrid event, again.
OC3 is the go-to event for security architects, cloud-native engineers, IT security experts, CISOs, CTOs, security researchers, and developers interested in confidential computing.
Catering to all expertise levels, OC3 2025 marked a milestone with a hybrid format, allowing attendees to join both online and in person. The on-site event was held at Amplifier Berlin, with 200 attendees.
The format for 2026 will be similar.
Key numbers for OC3 2025
2025 featured speakers and talks

Ensuring Confidentiality on Custom Silicon
EVP & Chief Architect
Arm
Richard is responsible for the long-term evolution of the Arm architecture and has led its development for more than 20 years, beginning with Armv6. He is currently leading development on Armv9 to ensure its specialized processing unlocks new markets and opportunities across the full spectrum of compute. In his early days at Arm, Richard worked on Arm720T, Arm940T, and Arm1136EJF-S. Prior to Arm, Richard worked for Analog Devices on fixed-function DSP, and at Inmos/ST on the Transputer. Richard is an Arm fellow, has a BA in Engineering from the University of Cambridge, and holds 107 patents in the field of microprocessors.

Panel: The Status Quo and Future of Confidential Computing
EVP, CTO & General Manager of the Office of the CTO
Intel
Greg Lavender is Executive Vice President, Chief Technology Officer (CTO) and General Manager of the Office of the CTO (OCTO) at Intel Corporation. As CTO, he is responsible for advancing Intel’s future technical innovation through his leadership of Intel Labs and Information Technology (IT). Greg oversees Intel’s Information Security and Product Security portfolios, as well as ongoing investments in security research. His responsibilities also include enabling Intel’s software strategy across artificial intelligence, confidential computing, and the growing need for open accelerated computing to support Intel’s range of business and hardware offerings. Lavender joined Intel in June 2021 from VMware, where he served as Senior Vice President and CTO. He has 40 years of experience in software and hardware product engineering, cloud-scale systems architecture and engineering, and advanced research and development. Prior to his role at VMware, Lavender held executive and technology leadership positions at Citigroup, Cisco Systems, and Sun Microsystems. Prior to joining the tech industry, Lavender was on the faculty of the University of Texas at Austin for 14 years, including three years as Associate Chairman for Academics. Dr. Lavender holds a Bachelor of Science degree in computer science from the University of Georgia, and a Master of Science and PhD in computer science from Virginia Tech. He is an academic philanthropist having endowed three undergraduate scholarships and three PhD Fellowships. He serves on three academic advisory boards and is a Trustee of the American School of Classical Studies in Athens Greece.

Ubuntu Core - An Immutable OS for Securing Confidential Virtual Machines and Empowering ISVs to Build Trusted Appliances
Product Lead
Canonical
Ijlal Loutfi is the Product Lead for platform Security at Canonical. She is also a part-time lecturer at the University of Oslo. She started working on confidential computing back during her PhD studies at the University of Oslo, where she researched trusted execution environments for commodity endpoint devices. She also spent time as a visiting researcher at various labs, including HP Security Labs in Bristol. After completing her PhD, Ijlal joined the Norwegian Computing Center to focus on privacy-enhancing technologies. Earlier in her career, she worked as a field Consultant with Microsoft, deploying identity management and access control solutions to enterprises.

Panel: The Status Quo and Future of Confidential Computing
CTO & EVP
AMD
Mark Papermaster is Chief Technology Officer and Executive Vice President responsible for Advanced Micro Devices (AMD) technical direction and product development. He led the re-design of engineering processes at AMD and the development of the award-winning “Zen” high-performance x86 CPU family, high-performance GPUs and the company’s modular design approach, Infinity Architecture. He also oversees Information Technology (IT) that delivers AMD’s IT infrastructure and services. Before joining AMD in October 2011 as Chief Technology Officer and Senior Vice President, Papermaster was the leader of Cisco’s Silicon Engineering Group, Apple Senior Vice President of Devices Hardware Engineering responsible for iPod and iPhone products and held multiple IBM leadership roles in technology and product development. In October 2024, he was appointed the Vice Chair of the US Department of Commerce Industrial Advisory Committee (IAC) for the CHIPS for America program. He is also an active member of several boards and committees, including the Global Semiconductor Alliance Board of Directors, IEEE Industry Advisory Board, The University of Texas at Austin Cockrell School of Engineering Advisory Board, The University of Texas President’s Austin Innovation Board, and Purdue University Semiconductor Degrees Leadership Board. Papermaster received his bachelor’s degree from the University of Texas at Austin and master’s degree from the University of Vermont, both in Electrical Engineering.

Securing AI's Third Dimension: Scaling Trust for Autonomous Intelligence
VP of Software Product Security, Architecture and Research
NVIDIA
Daniel Rohrer is VP of Software Product Security, Architecture and Research at NVIDIA. In his 24 years at NVIDIA, he's led efforts to enhance AI security, deliver GPU Confidential Computing, and advancing research efforts in secure platform design. Daniel has taken his integrated knowledge of "everything NVIDIA" to hone security practices, explore novel cybersecurity solutions, and help deliver some of the world’s most advanced and trustworthy computing platforms.

Panel: The Status Quo and Future of Confidential Computing
CTO, Deputy CISO, and Technical Fellow
Microsoft Azure
Mark Russinovich is CTO, Deputy CISO, and Technical Fellow for Microsoft Azure, Microsoft’s global enterprise-grade cloud platform. A widely recognized expert in distributed systems, operating systems and cybersecurity, Mark earned a Ph.D. in computer engineering from Carnegie Mellon University. He later co-founded Winternals Software, joining Microsoft in 2006 when the company was acquired. Mark is a popular speaker at industry conferences such as Microsoft Ignite, Microsoft Build, and RSA Conference. He has authored several nonfiction and fiction books, including the Microsoft Press Windows Internals book series, Troubleshooting with the Sysinternals Tools, as well as fictional cyber security thrillers Zero Day, Trojan Horse and Rogue Code.
The future of cloud computing is confidential
OC3 is the conference that brings together the confidential computing community. The event is hosted and organized by Edgeless Systems. Our company is built on the principles of open source, using a community-driven approach to deliver confidential computing technology. We invite experts, users, and those who are interested in the topic to share feedback and discuss the future of open-source confidential computing.
OC3
OC3 is the conference for the open-source confidential computing community. Join core committers and contributors, new and advanced users, as well as thought leaders to share experiences and best practices in confidential computing. Learn more about the latest innovations in the ecosystem, updates on current projects, and the future of this powerful technology.
Edgeless Systems
Edgeless Systems is a cybersecurity startup on the mission to build easy-to-use open source tools that make confidential computing accessible to everyone. We develop innovative software that enables new and exciting forms of trustworthy data processing.
Confidential computing
Confidential computing is an emerging technology that protects data not only at rest or in transit but also in use. A hardware-based trusted execution environment provides an isolated area, a secure enclave within a CPU, that protects sensitive data while being processed. The contents of an enclave are always encrypted throughout the data lifecycle.


%5B25%5D.png)




%201.png)


