It encourages people to think about cyber security not as something that’s purely reacting to things, but actually designing the zero-trust parameters using the latest zero knowledge, homomorphic encryption, and so on.

Keyboard shortcuts

j previous speech k next speech