How to ensure that the contextual confidence is still retained, assuming a breach without a single point of failure? I encourage you to look up SEMI E187. It is the SEMI consortium work, so we don’t own the work, but we do provide the use cases and the experiences and so on, and also some of the certification work. For example, for the identity part, the FIDO, Compliance Identity Management and so on, we have an additional institute, the right on the triangle, the National Institute of Cyber Security that is arm’s length from our ministry and also arm’s length from the industry.

Keyboard shortcuts

j previous speech k next speech