“Adopting a Zero Trust security model.”

We recently ran a CISO & CIO Singapore Lunch on behalf of BeyondTrust with our moderator Udit Mathur – Senior Manager of Cyber Security – EY kicking off the discussions with…

The last two years have seen many organisations undertake significant digital transformation programs. Along with the adoption of remote working has been the move to the cloud.

However, cyber security in some organisations has fallen behind, with many employees now sitting outside the safety of the traditional firewall. Threat actors are taking advantage of these environments, exploiting over-privileged remote users and insecure remote connections to unleash malware and ransomware attacks, costing some organisations millions of dollars and putting others out of business.

Adopting a Zero Trust security model is recommended by cyber security experts such as the US government agency, and the Cybersecurity and Infrastructure Security Agency, to strengthen cyber defences against commonly exploited weak security controls, including over-privileged users. The Singapore Government is also looking to implement its own version of Zero Trust.

We discussed:

  • Hear from your peers on how they are approaching Zero Trust in their organisations
  • Understand the NIST “airport model” as it relates to the least privilege
  • Know how PAM can support the least privilege

Share this post with your friends