Cryptography is at the heart of digital identity and cybersecurity. Indeed, so much “digital identity management” boils down to key management. In almost every modern application we need to bind public keys to humans and non-human entities, and we need assurance that private keys and secret symmetric keys are under the proper control of those entities. We also need evidence of the quality of all those keys and the cryptographic software that uses them. The emerging field of Confidential Computing (CC) helps address these critical issues at the infrastructure layer. CC makes hardware-backed cryptographic security available to all applications and workloads, thanks to “Trusted Execution Environments”, or TEEs – literally, digital identity engines. Remote attestation services provide assurance of hardware and software integrity in every TEE. This panel of CC leaders will traverse the practical issues of CC and digital identity management, and show how CC is going to become essential for authentication and data protection for all digital entities, applications, and workloads. Topics covered include: • What is Confidential Computing? • Where are Trusted Execution Environments used today? • How are access privileges separated out in Confidential Computing? • How can Confidential Computing help with digital wallets and verifiable credentials?