Luke Simonetti, Ben Perry, John Engates
Although data is only one of the pillars of zero-trust architecture, it is the underpinning of its creation. Moving from a model of “trust, but verify” to “never trust, always verify” brings privacy programs to life and enables security teams to strictly enforce privacy and governance requirements set by the business and establish a defensible position if called into question.
Luke Simonetti, VP of Cyber Strategy Solutions, Booz Allen Hamilton
Ben Perry, Of Counsel, Ogletree Deakins
John Engates, Field Chief Technology Officer, Cloudflare
Reading Materials:
Reinforcing Privacy Programs Through Zero-Trust Architecture