Page 53 - Cyber Defense eMagazine July 2024
P. 53

These  risks,  known  as  insider  threats, account  for  60%  of  data  breaches and  can  be  malicious  or
            accidental.

            Zero trust is about managing the blast radius – meaning, if and when something bad happens,  what is
            the  size and  amount  of the  damage;  likewise,  how  long does  it  take teams  to detect  the  breach  and
            perform  remediation?  This  model  maintains  strict  access  controls,  verifies  everything  and  monitors
            continuously. Zero-trust architecture also divides the network through microsegments to isolate and block
            attacks, restricting the lateral movement of bad actors should they gain access.

            A zero-trust model transforms a simple castle into a labyrinth of passageways,  gates, and checkpoints,
            minimizing the damage from intentional and unintentional threats. While this approach may seem overly
            distrustful of employees, it is more than appropriate in today’s unpredictable threat environment.



            Every Individual Has a Role to Play in Security

            Cybersecurity  is  constantly  evolving  with  the  introduction  of  new  technologies.  Generative  AI,  for
            instance, benefits businesses and bad actors alike, forever changing the landscape. Although technology
            continuously evolves, causing techniques and best practices to become irrelevant overnight, humans will
            always be a core element of any risk management  strategy.  As such, businesses  must remember  the
            influence each member of the organization has on the organization’s security wellness or lack thereof.






            About the Author

            Sam  Rehman  is  Chief  Information  Security  Officer  (CISO)  and  Head  of
            Cybersecurity  at  EPAM  Systems,  where  he  is  responsible  for  many
            aspects of information security.   Mr. Rehman has more than 30 years of
            experience  in  software  product  engineering  and  security.  Prior  to
            becoming EPAM’s CISO, Mr. Rehman held a number of leadership roles
            in  the  industry,  including  Cognizant’s  Head  of  Digital  Engineering
            Business,  CTO  of  Arxan,  and  several  engineering  executive  roles  at
            Oracle’s Server Technology Group. His first tenure at EPAM was as Chief
            Technology Officer and Co-Head of Global Delivery.

            Mr.  Rehman  is  a  serial  entrepreneur,  technology  expert  and  evangelist  with  patented  inventions  in
            software  security,  cloud  computing,  storage  systems  and  distributed  computing.  He  has  served  as a
            strategic  advisor  to multiple  security and  cloud companies  and is a regular contributor  in a number of
            security industry publications.

            LinkedIn

            Website: https://www.epam.com/






            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          53
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   48   49   50   51   52   53   54   55   56   57   58