As an increasing number of businesses use cloud technologies, cybersecurity has become one of the largest concerns in the world. Since the pandemic, the number of cyber security incidents in India too has shot up due to growing cloud use, work from anywhere capabilities, and client digital transformation initiatives.
Shivaprakash S. Abburu, Partner, Cybersecurity Consulting, EY India, discusses ZTA's newest techniques to assure security and explains how ZTA functions, with podcast presenter Ashish Kuttickal, Associate Director, EY India.
Key takeaways
- Traditional methods of securing enterprise assets are no longer sufficient as many resources are on cloud.
- ZTA applies the never trust, always verify approach to every access request from a person or a non-person entity.
- An enterprise’s ZTA journey must start with building a stable cyber visibility framework based on a uniform data and identity fabric.
- In a brownfield estate, one must identify opportunities to improve the level of verification. In a greenfield estate, one can start afresh.