Cybercrime with Zero
Trust
By Jason Norred, Senior Director, Security Solutions II, Inc., friend of Andersen
Alumni Connect with the Author on
LinkedIn
A majority of cybercrime CAN be prevented. The threat landscape
and attackers continue to evolve to take advantage of users and organizations
that are changing due to consumer pressure, digital transformation, supply
chain constraints, remote workforce, and more. Our security model must evolve
to align with the shifting landscape of business operations.
In the recent article from IBM, “Zero Trust:
Follow a Model, Not a Tool,” the concept of a
zero-trust model is introduced and discussed as a security model instead of as
a tool or technology. At its simplest definition, a zero-trust model can be
described as “Zero trust ensures verification and authorization for every
device, every application and every user gaining access to every resource.”
This definition can be further expanded to state EVERY time. This model of
zero-trust can help prevent cybercrime by requiring verification and
authorization of every resource every time.
Moving from a security model focused on traditional castle walls
and moats around the perimeter to a model of a fluid perimeter (or no
perimeter) is not trivial, but if the model is adopted, it can be built over
time. It’s a mindset shift versus a technology shift.
Solutions II also helps you avoid complications through a secure framework
for change called the Adaptable Data Center® (ADC) that simplifies the
complexity while decreasing technical debt with IT investments. The ADC
framework takes security into consideration and all of your priorities and
creates an actionable roadmap to take you from your current state to your future
state. This can be a game-changer not only in your security approach to 2021
but in all of your IT priorities.
For more information, visit us here for the full IBM article on Zero Trust.