So for example, when I sign an official document, my biometric, my fingerprint is checked by my phone. The integrity of my phone is checked by crowd strike. The integrity of crowd strike is checked by cloudflare and so on. So that even when one of them is breached, we assume one of them is probably already breached at any given time, it will be stopped in their tracks by the other two defenses. And so by adopting the same zero trust architecture, we can then contribute back from our cybersecurity industry to help safeguard other liberal democracies as well.

Keyboard shortcuts

j previous speech k next speech