RSA Conference

Transcendent Tango: The Role of Cryptography in Establishing Zero Trust Identity


Listen Later

In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world.
Speakers:
Karen Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot
Kacy Zurkus, Content Strategist, RSA Conference
...more
View all episodesView all episodes
Download on the App Store

RSA ConferenceBy RSA Conference

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

5 ratings


More shows like RSA Conference

View all
Malicious Life by Malicious Life

Malicious Life

924 Listeners