02.11.2021 Views

Cyber Defense eMagazine November Edition for 2021

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Keeping Your Guard Up: Protecting Against Inherent<br />

Trust Risks<br />

Important steps to identify inherent trust in the risk management process<br />

By Zubaid Kazmi, a managing director in MorganFranklin Consulting’s cybersecurity practice<br />

Trust is a huge problem in cybersecurity. Whether gaining access to a building or infiltrating a computer<br />

network, anything can be breached with the right credentials. While implementing multiple identity zones<br />

is a good measure in the zero-trust playbook, a bad actor that can get through a first checkpoint, can<br />

certainly make it through the second. This is why implementing a second checkpoint that requires<br />

biometric verification or requests in<strong>for</strong>mation only the real employee would know is vital <strong>for</strong> security.<br />

Meanwhile, most organizations still inherently trust the strength of their verification processes, and this<br />

trust extends to what happens once an intruder is inside the organization.<br />

The Risks of Inherent Trust<br />

In a world where it is increasingly difficult to trust that an identity is true and not compromised, models<br />

like “zero-trust” are catching interest and frequently being implemented. The best way to approach zerotrust<br />

within an organization is by being intentional about trust. This goes beyond traditional<br />

authentication and access governance use-cases. It extends to the supply chain of identities,<br />

organizations, and services. It also goes beyond just third-party risk management and starts delving into<br />

fourth-party risk management. Truly protecting an organization means thinking about zero-trust as an<br />

assessment of where there is inherent trust across business processes, contractual agreements, systems<br />

integrations, and (yes) identity and access controls.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2021</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!