Select Page
Zero Trust: Marketing Buzzword or Realistic Strategy?

Zero Trust: Marketing Buzzword or Realistic Strategy?

CISO Panels

Zero trust is not a new concept, but as times change, so too must cybersecurity strategies. The antiquated “trust but verify” model, for example, has proven insufficient. CISOs are now taking a secure by design approach. They don’t trust anyone or anything unless that trust happens through policy-based access control. Make sure people have access to what they need and only what they need, and not more than that. This approach makes sense given the heightened risk of unauthorized data access.

CISO Street recently moderated a virtual CISO panel and asked panelists to share their perspectives on current cyber trends and challenges. In this video, Kevin Paige, CISO for Flexpo, and David Levine, VP Corporate and Information Security and CSO for Ricoh USA, share how they approach zero trust at their organizations.

CISO Street’s recent webinar, Zero Trust is Not Enough, takes a deeper dive into this critical topic. Security executives from SentinelOne, Intel, and MITRE discuss technologies and tactics that go beyond zero trust to protect organizations from cyberattacks. Watch the replay here.

RELATED POSTS

Selling to a CISO? Practice Empathy, Not Salesmanship

Selling to a CISO? Practice Empathy, Not Salesmanship

The cyber security marketplace is hot. Ask any candidate for a cybersecurity role. Better yet, ask any supplier to CISOs. The supplier audience is especially vast, and it’s continuing to grow. Just three years ago, there were estimated to be less than 2,000...

The Risk of Measuring Risk

The Risk of Measuring Risk

Automated measuring of control effectiveness is a very good idea conceptually. When you can combine control gaps with relevant threat information, you get a very good picture about the actual technical cyber risks your business faces. If done correctly, it provides...

Mitre Disrupting Advanced Persistent Threats
Share This