, a zero trust cybersecurity firm. There, he was responsible for guiding federal customers on how to utilize identity-based access control to protect their IT and operational technology systems.
Source: ExecutiveBiz
, a zero trust cybersecurity firm. There, he was responsible for guiding federal customers on how to utilize identity-based access control to protect their IT and operational technology systems.
Source: ExecutiveBiz