PodChats for FutureCIO: Integrating zero trust into existing security architectures

23/10/2021 13 min Temporada 2
PodChats for FutureCIO: Integrating zero trust into existing security architectures

Listen "PodChats for FutureCIO: Integrating zero trust into existing security architectures"

Episode Synopsis

One of the outcomes of the pandemic has been the increased in cyberattacks riding on the mass work from home or remote work, and the haste with which IT had to get move as much of the organisation. It can be argued that the traditional perimeter-based security has lost some of its teeth as a result.Zero trust is lauded by some as the next evolution of an organisation’s security architecture designed to support new user populations, customer engagement models, cloud adoption, and IoT devices.As the concept takes hold at the executive suite and board, analysts and vendors are claiming that zero trust is fast becoming the security model of choice for many organizations.But as we all know, things are always easier said than done. Experience tells us that security leaders will struggle with the fundamental shifts in strategy and architecture required to holistically implement Zero Trust.In today’s PodChats for FutureCIO, we speak to Parag Arora, VP and MD, for SEA, Korea and India at Citrix.1.       Why is zero trust more important than ever for businesses in 2021/2022? 2.       What are the common misconceptions of around zero trust security?3.       From what I understand zero trust is not a product but more an approach. How does this affect security strategies which are often based around products?4.       Organisations in Asia are taking the hybrid approach to their computing requirements. How does one integrate a zero-trust strategy when IT will sit across a combination of on-premises servers, private cloud and public cloud?5.       For industries that follow very stringent regulatory frameworks built over years, how will zero trust impact the CIOs/CISOs charged with looking to add zero trust principles in the security architecture?6.       As we come to 2022, can share your top three recommendations for how businesses can implement the zero-trust approach successfully? 

More episodes of the podcast CXOInsights by CXOCIETY