Not only keeping us safe, but also using this methodology to make sure that when we work with other, for example, Pacific islands, Caribbean islands, and so on, to help them on their infrastructure, they can rest assured that no place in the stack is vulnerable to coordinated inauthentic behavior or to advanced persistent threats.

Keyboard shortcuts

j previous speech k next speech