Digital Identity , Governance & Risk Management , Identity & Access Management

Embracing a Unified Identity-Centered Zero Trust Approach

Clay Rogers of CyberArk, Amit Chhikara of Deloitte Discuss Critical Considerations
Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances, CyberArk

With the ever-evolving threat landscape overlaid onto the continuous digital transformation underway at so many organizations across all sectors, a unified identity-centered zero trust security approach has never been more important, said Clay Rogers of CyberArk and Amit Chhikara of Deloitte.

"All your crown jewels are exposed through applications and platforms, and you're trying to sell that data or use it for other business applications. You need a strategy that's cohesive, centered around identity, to protect it in the right way," Chhikara said.

"A lot of organizations are revisiting their identity tools and making a big investment in newer tools. The more that you can unify that approach, the easier you can make it on that organization," Rogers said.

In this video interview with Information Security Media Group at RSA Conference 2024, Rogers and Chhikara also discussed:

  • The critical components of an identity-centered zero trust approach, what customers need to look for, and how organizations can align their business and technology objectives when adopting such an approach;
  • Recommendations for a comprehensive unified platform for a zero trust approach;
  • The significance of an alliance between Deloitte and CyberArk.

Rogers has more than 20 years of IT security experience, including classified network assessments for the U.S government, network security consulting for Fortune 100 companies, and extensive channel sales management and program development with network security and cloud storage industry leaders.

Chhikara, has been with Deloitte for nearly 17 years. Prior to that, he was a business analyst and consultant at several other technology firms.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.