How can we cut through the hype to effectively implement Zero Trust principles?

How can we cut through the hype to effectively implement Zero Trust principles?

In our last Super Cyber Friday event, "Hacking the Hype of Zero Trust: An hour of critical thinking about what are the identity and access functions that are helping us achieve this security nirvana," we focused on dissecting the realistic aspects of Zero Trust, identifying which identity and access functions truly advance its goals, and discussing strategies to implement effective Zero Trust elements without striving for unattainable perfection. Joining us for this discussion were Rob Allen , chief product officer at ThreatLocker , and Antony Symonds , head of group IT operations at Westland Horticulture Ltd .?

Join us in TWO weeks

>> REGISTER for 11-01-24 Super Cyber Friday , "Hacking Your Cyber Brand" <<

HUGE thanks to our sponsor, ThreatLocker

DEMO: ThreatLocker blocks ChatGPT-created malware

Best quotes from our guests?

“As you have a static environment, Zero Trust is an ongoing activity. You have to continually improve.“ - Rob Allen, ThreatLocker

"People are confused because Zero Trust is a term that encompasses many different things. In reality, you have to look at each aspect individually: Are you blocking applications? That's Zero Trust. Are you limiting access to the network? That's Zero Trust. Are you requiring people to request access to specific systems? Privileged access management is also part of Zero Trust. Each of these needs to be evaluated separately." - Antony Symonds, Westland Horticulture Ltd

“Permit by exception is obviously really important because just denying by default, you won't be able to do anything, you won't be able to operate, you won't be able to do business.” Rob Allen, ThreadLocker

"I worked out the roadmap of what I need to do after being hit—we got hit hard. So, off the back of that, we asked, 'What do we need to do?' We almost had our action list built for us by experiencing a pretty major ransomware event. That basically set the tone for where we were going next. Ever since then, it's just been 60% security and 40% operations instead of 20% security and 80% operations." - Antony Symonds, Westland Horticulture Ltd

Watch the full video

Quotes from the chat room

“A big challenge I've seen in several organizations is 'what does right look like' for ZT?” - Drew Brown , IT specialist (security), Federal Aviation Administration

“Zero Trust is similar to DLP (data loss prevention) in the past. All of your client and senior execs have heard of it and all think it's a single tool to implement. Rob said it well, communicating that it's a concept and strategy and not a single tool is a challenge we all face.” - Paul Culligan , IT risk management advisor, DATA DEFENSE SOLUTIONS

“Unless you have a static environment, ZT is an ongoing ACTIVITY you have to continually improve.” - Adam Arellano

“Good rule of thumb: If the government has released a recommendation to do something, and you haven't, you are waaaaaay behind.” - Adam Arellano

TJ Williams

Trying something new

3 周

It was fun to listen to experts and attempt to glean the nuggets, thanks gang!

回复
Drew Brown

Map it, build it, use it. Improve it NOTE: Posts, reposts, likes, and other actions on this account are endorsed by me and not any organization or entity associated with me.

3 周

Bald bearded cyber dudes for the win

要查看或添加评论,请登录

David Spark的更多文章

社区洞察

其他会员也浏览了