Tech trends

Tech Trends: How businesses can adopt Zero Trust Architecture for cybersecurity

In this episode of the podcast, we talked about cybersecurity, more especially the Zero Trust Architecture, or ZTA, a novel strategy that is gaining popularity. 



As an increasing number of businesses use cloud technologies, cybersecurity has become one of the largest concerns in the world. Since the pandemic, the number of cyber security incidents in India too has shot up due to growing cloud use, work from anywhere capabilities, and client digital transformation initiatives.

Shivaprakash S. Abburu, Partner, Cybersecurity Consulting, EY India, discusses ZTA's newest techniques to assure security and explains how ZTA functions, with podcast presenter Ashish Kuttickal, Associate Director, EY India.

 Key takeaways

  • Traditional methods of securing enterprise assets are no longer sufficient as many resources are on cloud.
  • ZTA applies the never trust, always verify approach to every access request from a person or a non-person entity.
  • An enterprise’s ZTA journey must start with building a stable cyber visibility framework based on a uniform data and identity fabric.
  • In a brownfield estate, one must identify opportunities to improve the level of verification. In a greenfield estate, one can start afresh.
The current security measures in most organizations have been built keeping in mind a threat vector that is outside. But as soon as the network ceases to be the perimeter, the dimension of threat vectors increases to inside-out and inside-in.

For your convenience, a full text transcript of this podcast is available below:


If you would like to listen to our podcasts on the go:

Podcast

Duration

0h 14m 38s

Related content

Chapter IV: How cloud adoption lets untethered enterprises soar

Cloud computing has reshaped the way organizations do business. Learn more about the emerging trends of cloud adoption.

Chapter III: Zero Trust— the vigilant enterprise

The Zero Trust Architecture (ZTA) approach of cybersecurity works on the principle of don’t trust; always verify, where access is limited for all entities and continuously evaluated.

EY Tech Trends chapter II: how are Indian telecom companies donning a 5G skin?

Discover telcos need to reinvent themselves to stay relevant in the enterprise segment as non-telcos could soon start offering their own 5G services. Learn more about 5G technology in India.