Intelligent CISO Issue 52 | Page 52

COVER STORY
do you manage this successfully across six continents ?
It comes down to multiple layers – build your defence in depth and have multiple layers . We ’ ve multiple protections – if one ’ s going to fail , hopefully the other one will catch it . I say defence in depth and multiple layers , but I also love simplicity . We want application access to be as simple as possible because we ’ re here to support the business . So , simple , with multiple layers , but as invisible as possible to my end-users because we want it to be seamless and beneficial to them too .
Also , it ’ s our view that users are not our weakest link , they really are our best sensors . If you educate your endusers , make them aware , engage them , then you will be shocked at what gets reported ; how great information starts flowing in when you have properly educated people . People have this thing called intuition that computers just don ’ t have yet – despite all the advances and Artificial Intelligence , people ’ s intuition still trumps anything that a computer can do . So again , people are not the weakest link , they are our best sensors and we believe in empowering them .
Can you tell us more about the adoption of the Zscaler Zero Trust Exchange cloud platform to secure your Industry 5.0 transformation ?
We ’ ve begun our journey to improve the security of our organisation by utilising Zscaler and starting within identity-based access : Who are you ? How do we know you are who you say you are ? What should you have access to ? And then it comes down to whether we know your device – is the Zscaler agent on your device or are you coming from an unknown device ? And , if you ’ re on an unknown device , do we change the access – so if you ’ re coming from your corporate-owned device with the Zscaler agent , you can access , you can download , you can do whatever you want – but if you ’ re coming from an unknown device , do we give you access to a webbased option where you can view but not download ? Zscaler really gives you the ability to have this granular access and it starts with this identity-based access .
The second aspect is segmentation and segmentation means our end-users , including myself , should not be able to see the entire network . I don ’ t have legitimate access to the entire network so I shouldn ’ t see the entire network .
52 www . intelligentciso . com