top of page
Search
profwallringdis197

Are CISOs ready for zero trust architectures: The role of technology in enabling people and process



Make zero trust progress while optimizing the digital experience. Zero trust enables secure access for users and devices and within apps, across networks, and clouds. Embed zero trust across the fabric of your multi-environment IT by securing access in a way that frustrates attackers, not users.


For business and security leaders struggling to reduce risk at scale, we can help create and enforce zero trust policies across all control points without compromising user experience or team productivity.




Are CISOs ready for zero trust architectures




Business boundaries have blurred, with organizations now operating as ecosystems. When there are no borders, everyone is an insider, which dramatically increases risks across every aspect of business. By collaborating with Cisco on zero trust, our customers have decreased the risks and costs of a data breach by nearly half, achieved a 191% ROI by enabling hybrid work and optimizing the security team's performance, and increased SOC efficiency by 90%.


Our solutions are focused on a secure and seamless user experience to deliver strong security and high productivity. We meet you where you are to deliver zero trust with visibility and control embedded at every layer, from campus to data center to cloud to edge. We've also embarked on zero trust for ourselves. Cisco's rollout of zero trust has unlocked about $4M in annual savings from increased productivity and IT helpdesk support costs. We are also able to prevent 86K system compromises each month by enabling users with self-remediation of out-of-compliance devices.


With increasingly distributed workforces and the rise in identity-based attacks, identity has become the de facto perimeter for organisations today. Identity is the foundation of a zero-trust architecture, as you need to ensure the right people have the right level of access, on the right device, to the right resource, in the right context. Learn how a comprehensive, identity-first security strategy can tie the complexities of protecting people and assets together in a seamless experience.


Today most organisations have applications and data dispersed over multiple clouds, containers and on-premise environments. The fragmented nature of a hybrid or multi-cloud architecture makes it harder to manage security risks underscoring the need for a zero trust model. At the same time, cloud security skills have never been more in demand, leaving many organisations without the expertise to deliver on the promise of zero trust architecture.


Ken Mizota, APJ CTO at Rapid7 will share his guidance on how to overcome the widening skills gap, manage everything from identity to enforcement, and make zero trust effective for your cloud environments.


Third parties have demonstrated repeatedly to be a leading cause of data breaches. In this session, learn about security ratings and how it can be applied to help you achieve zero trust and navigate the risks coming from your third parties.


The maturity model, which include five pillars and three cross-cutting capabilities, is based on the foundations of zero trust. Within each pillar, the maturity model provides agencies with specific examples of a traditional, advanced, and optimal zero trust architecture.


The Office of Management and Budget (OMB) and CISA maintain a central repository on federal zero trust guidance for the Federal Civilian Executive Branch (FCEB) agencies. This website includes the latest information and additional resources on zero trust, including the Federal Zero Trust Strategy.


Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running.


The OMB gave federal departments and agencies until 2024 to implement zero trust. CISA has outlined five pillars for zero trust: identity, devices, networks, applications and workloads and data. NIST plans to publish its guide in four phased volumes: summary; approach, architecture and security characteristics; how-to guides; and functional demonstrations. Cybersecurity experts are keeping close eyes on these, as they may provide definitive best practices and guidelines for rollouts.


Sadly, a survey by General Dynamics Information Technology found that less than half of federal agencies are expected to meet all zero trust needs by the 2024 deadline. The survey found also that 58% of respondents felt that rebuilding or replacing existing legacy infrastructure was one of the primary challenges to using zero trust. Around half (48%) also thought that their agencies lack the needed expertise.


Next, how do you adopt zero trust while maintaining or achieving regulatory compliance objectives? Start by aligning zero trust strategy with compliance requirements. (This is why the NIST guidelines will call for developing compliance and zero trust initiatives together.)


The growing threat of sophisticated cyber attacks has underscored that the Federal Government can no longer depend on conventional perimeter-based defenses to protect critical systems and data. The Log4j vulnerability is the latest evidence that adversaries will continue to find new opportunities to get their foot in the door. The zero trust strategy will enable agencies to more rapidly detect, isolate, and respond to these types of threats. By detailing a series of specific security goals for agencies, the new strategy will serve as a comprehensive roadmap for shifting the Federal Government to a new cybersecurity paradigm that will help protect our nation. These goals are directly aligned with and support existing zero trust models.


That doesn't resonate with some organizations whose leaders don't acknowledge cybersecurity's role in supporting the patient. But those organizations who do see the connection are increasingly interested in a zero trust architecture, which helps improve patient safety while reducing organizational risk.


The NCCoE initiated this project in collaboration with industry participants to demonstrate several approaches to a zero trust architecture applied to a conventional, general purpose enterprise information technology (IT) infrastructure on premises and in the cloud, which will be designed and deployed according to the concepts and tenets documented in NIST Special Publication (SP) 800-207, Zero Trust Architecture. The example implementations integrate commercial and open-source products that leverage cybersecurity standards and recommended practices to showcase the robust security features of zero trust architectures.


Since my old buddy John Kindervag first came up with the concept, ZT has been bastardized to mean just about anything associated with authentication, access control, network segmentation, and nearly everything else associated with cybersecurity. Given this expected industry confusion, let me start by grounding this blog with a mashup definition of zero trust. According to NIST:


Zero-trust (ZT) is a term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. Zero trust assumes there is no implicit trust grated to assets or user accounts based solely on their physical or network location. A zero trust architecture (ZTA) is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement.


In simple terms, zero trust policies and controls determine who (users, devices, etc.) can access what (applications, data, services), under what circumstances. When you fly, you are asked to provide a valid ID, boarding pass, and have your luggage checked before you are given permission to enter the boarding area. A zero trust airport would go even further, only permitting you access to a specific gate, airplane, and seat. Oh, and only if you kept your jacket on throughout the boarding process. If you removed it for any reason, zero trust would detect an environmental change and reevaluate the whole process from soup to nuts.


Unlike XDR, which is still forming as a market, zero trust has been around for years. In fact, ESG research indicates that 33% of organizations have already implemented some type of zero trust project across the enterprise while 30% are implementing zero trust for a specific use case. What type of use case? Third-party access to particular applications/services, VPN replacement, network segmentation, etc. Additionally, more than one-third (36%) of organizations claim that COVID-19/WFH has accelerated their adoption/expansion of zero trust. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Commentaires


  • Black Facebook Icon
  • Black Instagram Icon
  • Black Flickr Icon
bottom of page