In this keynote address, two senior cybersecurity leaders will discuss how technologies have evolved over the last decade to create both opportunities and challenges in security, and the ways in which threat actors today conduct escalating attacks against key elements of society from national security systems to the financial sector to democratic processes. They will look at how security evolved from the 1990s to the present, from centralized computing to decentralized computing and back again, and focus on the adoption of zero trust and confidential computing in stopping attacks on high-value data. Today the U.S. government has made zero trust a hallmark of its strategy. Is this the right approach? What can teams do to adopt a truly effective zero trust strategy? What lessons does the past offer for operators, managers, and national leaders? Tune in to listen to Greg Lavender, CTO of Intel, and Carl Wright, Chief Commercial Officer at AttackIQ, as they draw on lessons from history and examine the opportunities of the present world.