View, browse and sort the ever-growing list of sessions by day, time, pass type, topic, and format. With this Session Viewer, you can view session and speaker details for Game Developers Conference 2024.
You will be able to build your schedule with the GDC Mobile App. The GDC 2024 app will be available for download in Apple Apps and Google Play late February 2024.Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Adding a session to your schedule does not guarantee you a seat.
Tim Obezuk (Solutions Engineer - Zero Trust, Cloudflare ltd)
Ryan Kerry ( VP Engineering - Infrastructure, ESL Faceit Group)
Botir Bayzakov (Head of Sales, Gaming & iGaming , Cloudflare)
Location: Room 2011, West Hall
Date: Thursday, March 21
Time: 12:45 pm - 1:45 pm
Pass Type: All Access Pass, Core Pass, Summits Pass, Expo Pass, Audio Pass, Indie Games Summit Pass - Get your pass now!
Topic: Special Event
Format: Sponsored Session
Vault Recording: Not Recorded
Audience Level: All
You will learn about the importance of implementing a Zero Trust Architecture to connect users internal applications, protect access to sensitive data and enable remote workers across agencies, studios and contractors without compromising on security or developer experience.
The session will consist of short stories about how different companies were compromised, had reputational damage and lost millions of $$$ due to configuration, security, observability and/or human issues. The speaker will review what led to the issue, and how Zero Trust Architecture mitigates risk.
The wrap up of the segment will focus on where to pay attention to while evaluating vendors to implement Zero Trust Architecture.
Attendees will learn best practices of Zero Trust Architecture and solutions, which will help to leverage security at their organization.
People who are responsible to protect corporate infrastructure, data and workspaces, and consider migration to Zero Trust Architecture, and people who would like to listen about how attackers compromise security and why zero trust is important.