Tech trends

Tech Trends: How businesses can adopt Zero Trust Architecture for cybersecurity

In this episode of the podcast, we talked about cybersecurity, more especially the Zero Trust Architecture, or ZTA, a novel strategy that is gaining popularity. 

In conversation with:

Shivaprakash Abburu
EY India Technology Consulting Partner

As an increasing number of businesses use cloud technologies, cybersecurity has become one of the largest concerns in the world. Since the pandemic, the number of cyber security incidents in India too has shot up due to growing cloud use, work from anywhere capabilities, and client digital transformation initiatives.

Shivaprakash S. Abburu, Partner, Cybersecurity Consulting, EY India, discusses ZTA's newest techniques to assure security and explains how ZTA functions, with podcast presenter Ashish Kuttickal, Associate Director, EY India.

 Key takeaways

  • Traditional methods of securing enterprise assets are no longer sufficient as many resources are on cloud.
  • ZTA applies the never trust, always verify approach to every access request from a person or a non-person entity.
  • An enterprise’s ZTA journey must start with building a stable cyber visibility framework based on a uniform data and identity fabric.
  • In a brownfield estate, one must identify opportunities to improve the level of verification. In a greenfield estate, one can start afresh.
The current security measures in most organizations have been built keeping in mind a threat vector that is outside. But as soon as the network ceases to be the perimeter, the dimension of threat vectors increases to inside-out and inside-in.

For your convenience, a full text transcript of this podcast is available on the link below: Read the transcript.

If you would like to listen to our podcasts on the go:

Amazon music for Podcasters Spotify SoundCloud YouTube Music

Podcast

Duration 14m 38s

In this series

(Event List - Manual)