This is identity authentication, continued verification, and a never trust posture. Can you tell us how zero trust helps protect against a subset of cyberattacks? What’s your vision about zero trust? Why this is so appealing for moda and for…?
j previous speech k next speech