Governance & Risk Management , IT Risk Management

Is 'Zero Trust' the New Wave in Security?

Corey Williams of Idaptive on Putting It Into Practice
Corey Williams, vice president of strategy at Idaptive

The conventional approach to cybersecurity focuses on separating the good from the bad using perimeters, firewalls, containers and other methods. But Corey Williams of Idaptive says that approach is no longer sufficient.

See Also: User Entity & Behavior Analytics 101: Strategies to Detect Unusual Security Behaviors

"This is the case for two reason - one is, the bad guys are already in the network. And the second is the rise of mobile and cloud," he says.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Williams discusses:

  • How to put more context around access;
  • What "zero trust" looks like in practice;
  • News innovations in establishing identity.

Williams is vice president of strategy at Idaptive.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.