Endpoint Security , Governance & Risk Management , Internet of Things Security

Using 'Zero Trust' Model to Enhance IoT Security

Fred Streefland Addresses Misconceptions About the Model
Fred Streefland, EMEA cybersecurity director, Hikvision

Adopting the "zero trust" model is essential to ensuring security as organizations use more IoT devices, says Fred Streefland of Hikvision, a Chinese company that manufactures video surveillance equipment. He addresses misconceptions about the model.

See Also: JavaScript and Blockchain: Technologies You Can't Ignore

"Zero trust is a journey. It's a mindset and it’s a strategy," he says.

In a video interview with Information Security Media Group, Streefland discusses:

  • How the company handles security in the development process;
  • The value of the zero trust model and why it requires improved visibility.
  • The challenges pertaining to Hikvision being prohibited from selling products to the U.S. government.

Streefland is the director of cybersecurity and data protection officer for Hikvision, covering Europe, the Middle East and Africa. He has 28 years of experience within security and intelligence, previously serving as a military intelligence adviser to the secretary general of NATO. He has also served as CISO of enterprise software company Exact; corporate global CISO of Leaseweb, a Dutch hosting company; and CSO for Northern and Eastern Europe at Palo Alto Networks.

About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.