Most of the techniques described in the slides require ring-0 privileges (replacing descriptor tables and page tables etc). If you have those privileges, you can copy what you want anyway.
Unless the encryption key is guarded by something with SMM privileges -- has that been done?
Unless the encryption key is guarded by something with SMM privileges -- has that been done?