In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world.\n\nSpeakers:\nKaren Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot\nKacy Zurkus, Content Strategist, RSA Conference