www.helpnetsecurity.com Open in urlscan Pro
44.235.189.191  Public Scan

URL: https://www.helpnetsecurity.com/2023/11/29/wolfgang-goerlich-cisco-mature-zero-trust-model/
Submission: On November 30 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1701310690"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Mirko Zorz, Director of Content, Help Net Security
November 29, 2023
Share


STRATEGIES FOR CULTIVATING A SUPPORTIVE CULTURE IN ZERO-TRUST ADOPTION



In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco,
discusses the benefits of implementing a mature zero-trust model for both
security and business outcomes, revealing a decrease in reported security
incidents and enhanced adaptability.

Goerlich emphasizes the role of organizational culture in successfully adopting
zero trust, outlines strategies for cultivating a supportive culture, and talks
about future trends in the evolution of the zero-trust model.



WHAT ARE THE MEASURABLE BENEFITS OF IMPLEMENTING A MATURE ZERO-TRUST MODEL
REGARDING SECURITY AND BUSINESS OUTCOMES?

Good security first delivers a business outcome and, as a result, then increases
the security posture. When we research outcomes, we look to those around
enabling the business, managing risk, and increasing operating efficiency.

Organizations maturing their zero-trust programs are doing so in support of
digital transformation, workforce modernization, and adopting hybrid cloud
infrastructure. We’ve seen measurable increases in the security function’s
ability to keep up with the business, adapt to external events, and create a
security culture.

Specific to security, organizations maturing zero trust are half as likely to
report security incidents (dropping 67% to 33%). The likelihood of incidents
across the board decline, from a data breach, DDoS attacks, accidental
disclosure, or malicious insider. Ransomware is significantly less likely given
zero trust’s identity controls (11% decrease) and network and workload
protections (8% less likely). We see fewer incidents, the severity is lesser,
and the speed of response and recovery is greater.

HOW INFLUENTIAL IS ORGANIZATIONAL CULTURE IN SUCCESSFULLY ADOPTING ZERO TRUST,
AND WHAT STRATEGIES SHOULD LEADERS EMPLOY TO CULTIVATE A SUPPORTIVE CULTURE?

Culture and relationships are significant drivers for successful programs. In
the previous year’s study, we found organizations with mature zero-trust
programs were twice as likely to report strong relationships with their
executives, their peers, their directs (as measured by retention), and their
business partners (as measured by security culture). We see similar correlations
in this recent study. Strong relationships lead to good programs, leading to
stronger relationships and better security programs.

Security leaders should take a three-pronged strategy. First, invest time in
cultivating stakeholders and sponsors. Second, find opportunities to collaborate
with their peers. Finally, leverage and strengthen the security champions and
security advocates program. This will position leadership well for maturing zero
trust, but it doesn’t end there. Down the chain, there also needs to be
relationship building between IT, security, and business functions. It begins
with the CISO and CIO on the same page to kick the work off. But it doesn’t end
until the front-line security professional can contact the network admin and get
the work done.

WHAT ROLE DOES SECURING THE IT STACK PLAY IN A MATURE ZERO-TRUST MODEL, AND HOW
SHOULD COMPANIES APPROACH THIS?

This study researched zero-trust capabilities for identity, device, network,
workload, automation and orchestration. These capabilities align with the CISA
zero-trust maturity pillars. The zero-trust model uses policy to extend or
revoke a trust boundary when a person or service connects to an application or
resource. To be effective, this policy enforcement is across the IT environment
and up-and-down the IT stack. This includes directories and identity providers,
device management, firewall and networking infrastructure, software development
tooling, and more.

While 86.5% of organizations surveyed have embarked on zero-trust programs, only
2% of organizations have achieved maturity across all zero-trust pillars. Why?
There are many reasons, but certainly, IT complexity and a lack of engagement
from IT owners are contributing factors. Successful programs embed zero-trust
principles in the IT stack, leveraging relationships between security leadership
and IT leadership.

HOW DO INTEGRATION AND AUTOMATION DRIVE THE MATURITY OF ZERO-TRUST
IMPLEMENTATIONS, AND WHAT ARE SOME BEST PRACTICES FOR ACHIEVING THIS?

This was a surprise from this year’s study: organizations using Security
Orchestration and Automated Response (SOAR) are more likely to report having
zero trust in place (13.7%). We’re seeing a shift in how the industry defines
zero trust. Now we still have a long way to go in order to see automation widely
deployed, with 47% of organizations not yet started on the capability and only
15% of organizations reporting having completed it.

Successful zero trust programs must integrate multiple tools in policy decision
and automate multiple systems for policy enforcement. Otherwise, we run the risk
of siloed tech stacks, unused functionality, and unrealized benefits. Start by
including automation with future-state roadmaps and investigate what
functionality the current tooling will support. In addition, security leaders
should evaluate new purchases based on integrations, automation, and API
features.

HOW DOES IDENTITY AND ACCESS MANAGEMENT SERVE AS A CORNERSTONE IN ZERO TRUST,
AND WHAT ARE THE CHALLENGES IN IMPLEMENTING EFFECTIVE IDENTITY STRATEGIES?

Strong authentication, MFA, continues to have strong stopping power against
ransomware and supply chain attacks (8% reduction and 4%, respectively.) Yet the
phrase “identity is the new perimeter” will send a shiver through anyone who’s
had to lead an enterprise identity and access management program. It’s
challenging to properly on-board and off-board people, and to provision them
across the thousands of applications a typical organization relies upon.

This complexity won’t be going away any time soon. An effective strategy focuses
on successfully deploying key capabilities – like MFA, SSO, and RBAC – to a
tightly scoped set of people and applications. Then balance usability with
defensibility to get out of the way of the user while getting in the way of the
adversary.

By deploying a set of high-value security capabilities to a well-scoped
high-risk area of the business, security leaders can demonstrate the value of
zero trust and position the program for expansion and maturation.

WHAT FUTURE TRENDS DO YOU FORESEE IN THE EVOLUTION OF ZERO TRUST, AND HOW SHOULD
ORGANIZATIONS PREPARE TO ADAPT TO THESE CHANGES?

Zero trust has moved beyond the buzzword to be an actionable set of capabilities
and a defined architecture. Organizations are taking a standards-based approach
by leveraging NIST and CISA guidance.

While many of the early successes were with identity and device security,
success in zero trust requires enhancements in networks and workloads. We must
avoid zero trust becoming another siloed capability or bolted-on security
control. Therefore, organizations should prepare for integration and automation
becoming more important.

Security leaders bring capabilities and technologies to bear to solve business
problems and deliver business outcomes. Within this context, the future of zero
trust is taking its place alongside our fundamental security principles. At
every level, at every request, our IT environment must be able to extend or
revoke trust to provide access while protecting assets.





More about
 * authentication
 * automation
 * CIO
 * CISA
 * Cisco
 * CISO
 * cybersecurity
 * identity
 * NIST
 * opinion
 * SOAR
 * strategy
 * zero trust

Share


FEATURED NEWS

 * Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)
 * Okta breach: Hackers stole info on ALL customer support users
 * 5 resolutions to prepare for SEC’s new cyber disclosure rules

Report: The state of authentication security 2023



SPONSORED

 * eBook: Cybersecurity career hacks for newcomers
 * Download: The Ultimate Guide to the CISSP
 * eBook: Keeping Active Directory out of hackers’ cross-hairs
 * Guide: SaaS Offboarding Checklist




DON'T MISS

 * Sumo Logic discloses potential breach via compromised AWS credential
 * Marina Bay Sands breach exposed data of 665,000 customers
 * The 3 key stages of ransomware attacks and useful indicators of compromise
 * Aqua Trivy open-source security scanner now finds Kubernetes security risks
 * AI-assisted coding and its impact on developers




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×