Chris Butler
Dr. Chris Butler is a Senior Principal Chief Architect in the APAC Field CTO Office. He represents Red Hat engineering to Red Hat’s public sector clients and suppliers across Asia Pacific.
Chris, and his peers, engage with clients and partners who are stretching the boundaries of Red Hat's products. Chris facilitates co-innovation engagements with our clients and partners with our product engineering team.
From a technical perspective Chris enables clients to achieve their sovereignty outcomes. Frequently this is within complex multi-tenanted and high security environments and is consulted to see how the latest security technology can be used to achieve outcomes.
He is a maintainer of the OSCAL Compass ‘Cloud Native Compute Foundation’ project where he built compliance automation projects used by government agencies globally and is embedded within enterprise product solutions.
Prior to joining Red Hat Chris has worked at AUCloud and IBM Research. At AUCloud Chris led a team who managed AUCloud’s productisation strategy and technical architecture. Chris is responsible for the design of AUClouds IaaS & PaaS platforms across all security classifications and prioritisation of investment with internal and external stakeholders.
Chris spent 10 years within IBM in management and technical leadership roles finishing as a Senior Technical Staff Member at the Centre for Applied Research in IBM Consulting. Chris is an experienced technical leader, having held positions responsible for: HR management of technical teams; functional strategy within the IBM Research division (Financial Services); developing the IBM Global Technology Outlook; and as development manager of IBM Cloud services.
Chris’s technical experience spans from build and deployment of IaaS platforms to industry specific AI applications. He has consistent experience in the productisation of innovative technologies across multiple industry sectors.
Chris has been consistently recognised with corporate and academic awards. Chris has a PhD from Monash University modelling blood flow of thrombotic geometries using high performance computing.
Session
The principle of "Don't trust, verify" is fundamental, yet cloud computing often forces users to place implicit trust in opaque infrastructure and the organizations that audit the clouds.
Now you have options to follow that principle.
Confidential computing provides a fundamental change in this paradigm: hardware based trusted execution environments (TEEs) allow the cryptographic isolation of a users workload from underlying infrastructure providers, and this isolation can be verified on demand using a remote attestation.
This talk will explain the fundamentals of confidential computing including TEE’s and how remote attestation can be used to verify the integrity of the TEE. After laying this foundation this talk will explore the overlapping projects in the ecosystem such as Trustee, Keylime, fs-verity, ConfidentialContainers; and what is required to assemble these projects in a way that allows you to cryptographic verify of your security posture.