Adapted remarks delivered by Kent Walker at the International Conference on Cyber Security 2022. Source Previous Post Microsoft Cloud for Sovereignty: The most flexible and comprehensive solution for digital sovereignty Next Post Building and testing helpful AR experiences 0 Comments Leave a Comment Cancel replyYou must be logged in to post a comment.