Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Taking a Zero-Trust Approach to Security

Bill Mann of Centrify on Why Current Systems of Security Are Broken
Bill Mann, senior vice president of products and chief product officer, Centrify

Too many organizations believe in the fallacy that firewalls are keeping the bad guys out, when in reality, bad actors likely are already within their environments, says Bill Mann at Centrify, who calls for a "zero trust" approach.

See Also: The Operationalization of Threat Intelligence Programs

In a video interview RSA Conference 2018, Mann discusses:

  • How to implement a zero trust approach;
  • The security implications of decentralized infrastructures;
  • Centrify's "Secure the Vote" initiative.

Mann is senior vice president of products and chief product officer for Centrify. The enterprise software security executive has experience working at both large companies and startups.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.