Governance & Risk Management , GRC , Identity & Access Management

Implementing a Zero Trust Framework at Scale

Operationalizing the Principle of 'Never Trust, Always Verify'
Srini Tummalapenta, CTO, distinguished engineer, IBM Security Services, and Justin Douglas, vice president, solutions consulting, Palo Alto Networks

The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.

Watch this video interview to learn more about:

  • Ways to reduce the risk of threat with integrated security controls;
  • Why implicit trust must be eliminated at every stage of digital interaction;
  • How to make a framework repeatable for multiple users with trusted identity and the right access to the right data.

Tummalapenta is an IBM Distinguished Engineer and a key technical leader for IBM X-Force Protection Platform, Security Services. As the CTO for security solutions, he partners with product vendors, services offering, strategy, sales, solution design, and delivery teams to define technical strategy and road map. He works with the team at IBM Security Services to design, deliver and scale security solutions throughout the client base and oversees standards for service delivery to meet global IBM client demands, including regulatory and complex cloud security requirements.

Douglas is the vice president of solutions consulting at Palo Alto Networks.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.