Governance & Risk Management , Identity & Access Management , IT Risk Management

What 'Zero Trust' Means in Today's Environment

Lisa Lorenzin of Zscaler on Why This Approach Is So Important
Lisa Lorenzin, director of transformation strategy, Zscaler

"Zero trust" could be described as the bumper sticker for cybersecurity in 2020, but what does it actually mean? In a preview of an upcoming virtual roundtable discussion, Lisa Lorenzin of Zscaler offers a clear definition and describes how to implement it in the current environment with a growing remote workforce.

See Also: Live Webinar | Cybersecurity in Healthcare Supply Chains: A CISO Perspective

In a video interview with Information Security Media Group, Lorenzin discusses:

  • What "zero trust" means in today's environment;
  • What the COVID-19 pandemic and the rapid shift to working from home means for zero trust;
  • Some of the blindspots within organizations that can be eliminated via zero trust.

Lorenzin is director of transformation strategy at Zscaler, specializing in secure application access and digital transformation. For more than 20 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group and Internet Engineering Task Force.


About the Author

Nick Holland

Nick Holland

Director, Banking and Payments

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times. He holds an MSc degree in information systems management from the University of Stirling, Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.