RSA Conference

Transcendent Tango: The Role of Cryptography in Establishing Zero Trust Identity


Listen Later

In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world.
Speakers:
Karen Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot
Kacy Zurkus, Content Strategist, RSA Conference
...more
View all episodesView all episodes
Download on the App Store

RSA ConferenceBy RSA Conference

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

5 ratings


More shows like RSA Conference

View all
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

637 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,016 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,001 Listeners