We had to redesign our entire…for example, cybersecurity perimeters, to the national health insurance service, to have cybersecurity at the edges, to develop new what we call zero trust networks, and so on.

Keyboard shortcuts

j previous speech k next speech