Optimizing Zero Trust Strategy with a Risk-Based Approach

Presented bySoliton Systems K.K.

  • Targeted Threat / Cyber Attack
  • Authentication / Identity Management
  • Zero trust security model
Speaker

Soliton Systems K.K.

Evangelist
IT Security Department

Shoko Araki

close