We have had to think about two-factor authentication and secure by design. If I go through the three different parts, in terms of the rules of the road first. Let me give you and example on cross border data flows, how can you do those securely? How can you do enable data flows that are privacy compliant, consistent ways to have trusted data flows?

Keyboard shortcuts

j previous speech k next speech