Luke Simonetti, Ben Perry, John Engates

Although data is only one of the pillars of zero-trust architecture, it is the underpinning of its creation. Moving from a model of “trust, but verify” to “never trust, always verify” brings privacy programs to life and enables security teams to strictly enforce privacy and governance requirements set by the business and establish a defensible position if called into question.

Luke Simonetti, VP of Cyber Strategy Solutions, Booz Allen Hamilton
Ben Perry, Of Counsel, Ogletree Deakins
John Engates, Field Chief Technology Officer, Cloudflare

Reading Materials:

 

Ben Perry

Of Counsel
Ogletree Deakins

John Engates

Field Chief Technology Officer
Cloudflare

Luke Simonetti

VP of Cyber Strategy Solutions
Booz Allen Hamilton