Access Management , Cloud Security , Events

Security and User Experience: Critical Considerations

Bernardo Vasquez of Palo Alto Networks on Identity Access Management, Zero Trust
Bernardo Vasquez, advisory CISO, strategic client practice, Palo Alto Networks

As a CISO, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks.

See Also: Visibility Into Distributed Cloud Environments

"Having a seamless user experience is very important to me as a CISO … so that people don't come after me with pitchforks," he says.

In a video interview with Information Security Media Group at RSA Conference 2022, Vasquez also discusses:

  • His mission as an advisory CISO;
  • How identity and access management lends itself best to cloud security and resilience;
  • What's important about ZTNA 2.0 - and the lessons learned from ZTNA 1.0.

Vasquez is a cybersecurity, risk and privacy leader who serves as advisory CISO, supporting Palo Alto Networks' largest strategic clients. He's been in the trenches and the boardroom relating to the IT and business opportunities leaders face daily. Vasquez has served as CISO at Hudson and was also the first CISO at New York University. He has also been an adviser at organizations, including Deloitte, as a business partner on organizational transformations.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.