In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world.
Speakers:
Karen Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot
Kacy Zurkus, Content Strategist, RSA Conference