This document summarizes a talk on the finite-key security analysis of continuous variable quantum key distribution against coherent attacks. The analysis computes the key length that is secure for achievable experimental parameters. It uses an uncertainty relation proof of security, which provides an advantage over previous proofs by being one-sided device independent and avoiding state tomography or additional measurements. The talk outlines the security definitions, experimental setup and protocol, finite-key rates, and security analysis method.