Here’s a peek into the panel of experts we’ve lined up for you!Should organizations get ready to invest time and resources on a comprehensive zero trust strategy? Join #Tweetchat “Adopting a tailored #zerotrust approach for enterprises” using #STinsights on July 13, 2022 at 11 a.m. ET to know more. Save the date: https://t.co/bcMgUsDI3i pic.twitter.com/mriCLNzOWh
— CIO Straight Talk (@CIOStraightTalk) July 11, 2022
And now the first question for this engaging session!Follow #STinsights to join a Twitter discussion with leaders on “Adopting a tailored #zerotrust approach for enterprises.” Tune in at 11 a.m. ET today at https://t.co/Xbo5NaTJzd to join the discussion. #Tweetchat pic.twitter.com/tHYTqTTKRn
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
Now over to our experts to share their thoughts and opinions.We are going live with the #Tweetchat. Join using #STinsights. pic.twitter.com/E4pVs2TJEE
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
A1: It's never too late to be secure. The sooner you start your #ZeroTrust journey, the quicker you'll reduce your exposure @CIOStraightTalk #STinsights #cybersecurity #ZeroTrust https://t.co/zxsrYP8vZk pic.twitter.com/LNpG0BN8yZ
— Bill Mew #Tech4Good #Privacy #Cybersecurity 🇺🇦 (@BillMew) July 13, 2022
📌 Q1 - The foundation of Zero-Trust is the implementation of #IAM and Asset Management, and Enterprises should start there.
— Dr. ir Johannes Drooghaag (JD) #BYOC! 🕊 (@DrJDrooghaag) July 13, 2022
Although most Enterprises believe to have this covered, detailed audits reveal many surprises.@CIOStraightTalk #STinsights #ZeroTrust #CyberSecurity https://t.co/TQk0tbYfNv pic.twitter.com/tHtYgY0jfy
Ai. Zero Trust is the new Firewall for Enterprise: 1. Set up a goal based on where they are at. 2. Understand what needs to be protected 3. Apply NIST framework to Identify and measure risk 4. Build defence in depth with #ZeroTrust in mind.#STinsights @CIOStraightTalk #OneHCL https://t.co/PdYAAsTVLN
— Helen Yu (@YuHelenYu) July 13, 2022
Now that we know where and when to begin our Zero Trust journey, let’s ask the experts for some insights on the major market trends.Q1, For me, it begins with messaging and buy-in. ZT is a journey that will span many years and many different technology pillars. One of the most important factors in a successful ZT journey is by in from company leadership. Your companies CEO should understand what ZT is https://t.co/Kh4fMbyRdP
— Patrick McDonald (@Bearxor) July 13, 2022
Did you know about these market trends?Join the conversation using #STinsights. Here’s our second question. #Tweetchat pic.twitter.com/qzeEmf7lEV
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
Q2) It took years to undo the "crunchy on the outside, chewy on the inside" network perimeter. Yet we're remaking this mistake with Zero Trust "anywhere you make an access control decision" perimeters.
— J Wolfgang Goerlich (@jwgoerlich) July 13, 2022
Watch for shared signals and session controls.#STinsights @CIOStraightTalk
Q2, An increased focus by end-user organizations on zero trust strategies - and a desire to provide a more secure, flexible hybrid workforce connectivity - is driving increased interest in the Zero Trust market @CIOStraightTalk #STinsights #CyberSecurity https://t.co/pvuzTPj52D
— Sanjay Katkar (@sanjaykatkar) July 13, 2022
A2: Overall, Zero Trust discipline is maturing gradually. Most information security companies started with their differentiated solutions, but now they are converging around few standards (based on definitions from entities like @NIST). #STinsights #ZeroTrust @CIOStraightTalk https://t.co/TYhylujH5x pic.twitter.com/mvB4kDQ57E
— Sarbjeet Johal (SJ) (@sarbjeetjohal) July 13, 2022
Now let’s also understand the best practices organization should follow while integrating Zero Trust.Q2 1/2: Security Service Edge (SSE) Broker Gateways: the WFH movement, due to the pandemic,
— Rodney Nash (@agamsnow) July 13, 2022
started to question how do we allow people to access internal resources securely while being
people friendly. A move away from common VPNs. @CIOStraightTalk #STinsights https://t.co/PELYOHNPHE
Here’s some of the best practices according to our experts.Time for our third question. Join the conversation using #STinsights. Keep the questions coming! #Tweetchat
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
What are the best practices that enterprises should follow while integrating #ZeroTrust with their existing security architecture? pic.twitter.com/Ob7b9551JU
A3. 1.Identify-creates an inventory, classifies them & sets baselines
— Helen Yu (@YuHelenYu) July 13, 2022
2.Protect-authentication and authorization with ZT
3. Detect—identifies anomalies by continuously monitoring
4. Respond-Handles threat containment & mitigation real-time#STinsights @CIOStraightTalk #OneHCL https://t.co/kAdQuGpgJk
Q3) Approach Zero Trust as a transformation. Engage the COE, enterprise architecture, and project management. Develop repeatable patterns, reference architectures, and standard plans.#STinsights @CIOStraightTalk
— J Wolfgang Goerlich (@jwgoerlich) July 13, 2022
Q3, Years ago, a colleague taught me the phrase "don't let perfect be the enemy of good". While coming up with a comprehensive ZT strategy is great, don't let over-planning or edge cases hold you back from taking your first steps as soon as possible. https://t.co/XL3oparKVA
— Patrick McDonald (@Bearxor) July 13, 2022
Let's delve into the significance of identity and access management!Establish a high-level Zero Trust strategy first - this should address the "Why Zero Trust for my enterprise?" question. @CIOStraightTalk #STinsights#CyberSecurity #ZeroTrust #cyberattacks @Seqrite https://t.co/6QMTHoBQC4
— Sanjay Katkar (@sanjaykatkar) July 13, 2022
Keep scrolling to what our experts have to say.A big shoutout to everyone on our panel. Join the conversation using #STinsights. Here’s our fourth question. #Tweetchat
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
What is the significance of identity and access management in a #Zero Trust integration? pic.twitter.com/M0GKvK297Y
Q4: IAM is integral for ZT as the verify everything piece of the puzzle. It must be able to do continuous verification while being non-intrusive to the user. It must understand the user and not rely strictly on MFA. @CIOStraightTalk #STinsights https://t.co/m9f4RZ24q1
— Rodney Nash (@agamsnow) July 13, 2022
A4: Maybe instead of talking about #ZeroTrust, we need to talk about #WhoToTrust
— Bill Mew #Tech4Good #Privacy #Cybersecurity 🇺🇦 (@BillMew) July 13, 2022
"Identity and access management is all about giving the right people access to exactly the right data" @CIOStraightTalk #STinsights #cybersecurity #ZeroTrust https://t.co/doTXmVCxEI pic.twitter.com/nhp3DvripL
📌 Q4 - Identity and Access Management, just like Asset Management, are key to any Zero Trust integration.
— Dr. ir Johannes Drooghaag (JD) #BYOC! 🕊 (@DrJDrooghaag) July 13, 2022
Zero Trust without these key elements is akin to rearranging the deck furniture on the Titanic!@CIOStraightTalk #STinsights #ZeroTrust #CyberSecurity https://t.co/mqgbRNUdOL pic.twitter.com/bNWayrhgit
Let’s dig deep and talk about the challenges of implementing Zero Trust within an enterprise.A4: A Zero Trust strategy utilizes identity verification, authentication factors, authorization controls, as well as other Identity and Access Management (#IAM) and cybersecurity capabilities to verify a user before any level of trust is awarded. #STinsights #ZeroTrust https://t.co/jJIX3bCzvX
— Sarbjeet Johal (SJ) (@sarbjeetjohal) July 13, 2022
Here’s what are experts have to say about this.Keep shooting YOUR questions using #STinsights. Here’s our final formal question to the panel. #Tweetchat
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022
What are the key challenges of implementing #ZeroTrust within an enterprise’s existing SASE architecture? pic.twitter.com/Kwguf5XWuq
📌 Q5 - Enterprises face challenges with the “shared responsibility model” that can be part of a multi-partner #SASE architecture.@CIOStraightTalk #STinsights #ZeroTrust #CyberSecurity https://t.co/5JdSVIbJCc pic.twitter.com/J9xChXGirC
— Dr. ir Johannes Drooghaag (JD) #BYOC! 🕊 (@DrJDrooghaag) July 13, 2022
A5. SASE focuses on managing all aspects of the technology. Enterprises wanting to implement the ZT principles should use a SASE suite to ensure that their tech secures the way people work today.#STinsights @CIOStraightTalk #OneHCL https://t.co/PXJDmHmGtb
— Helen Yu (@YuHelenYu) July 13, 2022
Q5, ZT & SASE have more in common than their differences. Both provide a fresh look at security and take similar approaches to secure while enabling productivity. ZT has a broader view of security strategy and SASE tends to focuses more on technical capabilities. https://t.co/pbOwGOVrdc
— Patrick McDonald (@Bearxor) July 13, 2022
A5, Consolidate agent-based Zero Trust selection with the choice of SASE provider as part of the wider SASE architecture decisions to avoid the complexity and potentially unsupported configurations of multiple agents on a managed device. @CIOStraightTalk #STinsights #ZeroTrust https://t.co/49K6SQW8Q7
— Sanjay Katkar (@sanjaykatkar) July 13, 2022
And that’s the end, we'd like to thank our panelists for this insightful exchange of ideas. We promise to be back with some more interesting and valuable topics soon. Stay tuned!Q5: One solution, Zero Trust everything. At what cost? Can an organization afford to simply say, “Zero Trust Everything”? Typically, this is not realistic especially if microsegmentation is a Zero Trust goal of an organization. @CIOStraightTalk @STinsights https://t.co/rdwwaheveA
— Rodney Nash (@agamsnow) July 13, 2022
A big thank you to our Power Panel for their #STinsights and those who joined us for this exclusive #Tweetchat @BillMew @DrJDrooghaag @YuHelenYu @jwgoerlich @Bearxor @sanjaykatkar @sarbjeetjohal @agamsnow pic.twitter.com/S7gg9B55jO
— CIO Straight Talk (@CIOStraightTalk) July 13, 2022