Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CXOInsights by CXOCIETY

PodChats for FutureCIO: Integrating zero trust into existing security architectures

23 Oct 2021

Description

One of the outcomes of the pandemic has been the increased in cyberattacks riding on the mass work from home or remote work, and the haste with which IT had to get move as much of the organisation. It can be argued that the traditional perimeter-based security has lost some of its teeth as a result.Zero trust is lauded by some as the next evolution of an organisation’s security architecture designed to support new user populations, customer engagement models, cloud adoption, and IoT devices.As the concept takes hold at the executive suite and board, analysts and vendors are claiming that zero trust is fast becoming the security model of choice for many organizations.But as we all know, things are always easier said than done. Experience tells us that security leaders will struggle with the fundamental shifts in strategy and architecture required to holistically implement Zero Trust.In today’s PodChats for FutureCIO, we speak to Parag Arora, VP and MD, for SEA, Korea and India at Citrix.1.       Why is zero trust more important than ever for businesses in 2021/2022? 2.       What are the common misconceptions of around zero trust security?3.       From what I understand zero trust is not a product but more an approach. How does this affect security strategies which are often based around products?4.       Organisations in Asia are taking the hybrid approach to their computing requirements. How does one integrate a zero-trust strategy when IT will sit across a combination of on-premises servers, private cloud and public cloud?5.       For industries that follow very stringent regulatory frameworks built over years, how will zero trust impact the CIOs/CISOs charged with looking to add zero trust principles in the security architecture?6.       As we come to 2022, can share your top three recommendations for how businesses can implement the zero-trust approach successfully? 

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.