#DTX Cybersecurity Mini Summit: How to Apply Individualized Zero-Trust Architecture

#DTX Cybersecurity Mini Summit: How to Apply Individualized Zero-Trust Architecture

Organizations need to work out how to apply the principle of zero-trust security to meet their specific requirements, according to a panel speaking at the DTX Cyber Security Mini Summit.



The concept of zero-trust has come into much sharper focus as a result of the shift to remote working during COVID-19, with the traditional approach of having a secure outer perimeter now largely redundant. Thomas Fischer, principal security consultant at FVT SecOps Consulting, noted: “This global pandemic has been a wake-up call for a lot of organizations on how they handle the ability to use systems away from the traditional model of the castle and moat structure – nobody is now stuck to a fixed terminal in a building.”



This has in turn meant that to some extent, organizations have lost control and visibility of their assets, and most crucially of all in the view of Fischer, of their data. “The critical asset is the data – it could be credit card information, intellectual property or source code – any of those things that actually makes your business run,” he said.



Organizational strategies for gaining control over access to data in this new environment is therefore crucial, and has generally centerd around the concept of zero-trust. Moderating the panel, Richard Archdeacon, advisory CISO at Duo Security, defined this as “looking at how you can be as confident as possible in identifying the access and reducing the perimeter down to that point of access so we know who you are, where you are and what you’re going to be doing.”



While there is growing understanding of this general principle, th ..

Support the originator by clicking the read the rest link below.