Application Security , CISO Trainings , Governance & Risk Management

Implementing a 'Zero Trust' Approach to Security

Doug Copley of Duo Security on Going Beyond a Focus on the Perimeter
Doug Copley, advisory CISO, Duo Security

Every application should be protected the same way no matter where it resides, rather than focusing on a "perimeter" approach, says Doug Copley of Duo Security.

See Also: Safeguarding Election Integrity in the Digital Age

In a video interview at Information Security Media Group's recent Chicago Fraud and Breach Prevention Summit, Copley discusses:

  • How to enforce a "zero trust" model;
  • The importance of multifactor authentication;
  • Taking steps to enforce security on devices the organization does not manage.

Copley is advisory CISO at Duo Security. A former CISO in healthcare and chief privacy officer in financial services, he has 25 years of IT, information security and data privacy experience.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.