The speaker gives an overview of confidential computing and its importance in protecting data while in use on the CPU. Confidential computing allows for the encryption of data and code integrity while in use, preventing access to sensitive data through system compromise. The speaker also draws parallels to the Let's Encrypt movement and highlights key ideas for promoting the adoption of confidential computing, including awareness campaigns and the development of user-friendly software. The speaker also discusses the need for affordability and open source software to promote widespread adoption. The speaker invites attendees to join the confidential computing consortium and participate in tech and outreach meetings.