Posted on
in Presentations
Trusted Infrastructure solutions enable secure access to distributed IT infrastructures as well as cloud resources covering heterogeneous client devices. Unifying and connecting the cloud security mechanisms with verifiable encryption and key management solutions enables users to stay owner of their data. The panelists will discuss these fresh attempts to fulfill high security demands.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Participants
Norbert Pohlmann
Participant
Director / Chairman, Institute for Internet Security / IT Security Association TeleTrusT
Share With Your Community