Star 0

Abstract

This session will create a conversation with security practitioners about what works and what doesn't work when you are asked to secure your company's operations in an insecure environment.  What do you do when you cannot trust the locally purchased hardware, the network, and the insider threat to keep your secrets.