APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Workflow
    • Cyber Security
    • Hotel Management
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Workflow
    Editor's Pick (1 - 4 of 8)
    left
    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê

    Enhancing Workflow Management In Media

    Andre Mendes, CIO, Department of Commerce - International Trade Administration

    Delivering efficiency through workflow automation

    Wayne Marchant, CIO, Heritage Bank

    The Evolving Role of IT for Value Added Solutions

    Aaron Weis, VP & CIO, Axalta Coating Systems

    Cognitive automation: Revolution at the speed of thought

    Ritesh Sarda, CIO, Sun Life Financial, Hong Kong

    Addressing the Challenges in Behavioral Health Practice with Technology

    Wes Williams, VP & CIO, Mental Health Center Of Denver

    Workflow Management to Be a Game Changer in Businesses

    Jim Simpson, SVP & CIO, Avmed

    Simplifying Document-Intensive Tasks with Workflow Management

    Anthony G. Dupree, CISM CIO/CISO, Novitex Enterprise Solutions

    right

    Where Am I With Zero Trust? The Ciso's Reality

    Charmaine Valmonte, Chief Information Security Officer, Aboitiz.

    Tweet
    content-image

    Charmaine Valmonte, Chief Information Security Officer, Aboitiz.

    By failing to prepare, you are preparing to fail.” ― Benjamin Franklin. Cybersecurity has been a top priority for most organizations for the past decade. A large portion of an organization’s operational budget is spent on state-ofthe-art technologies as a means to protect the business from the threats of a cyber attack. However, technology is not the definitive solution to eliminate or reduce the risk; a disruption causing major losses can happen if the process and people are excluded from the equation.

    The transformed cybersecurity professional expects a cyber attack to happen anytime and come from anywhere. Today’s CISO must accept that the organization will continue to transform. The perimeters we’ve since built for the organization cannot contain or protect today’s evolving environment.

    Zero Trust, defined by the National Institute of Standards and Technology in its Special Publication 800-207, states that “Zero Trust presents a shift from a location-centric model to a data-centric approach for fine-grained security controls between users, systems, data and assets that change over time”. What does this mean to a CISO who has spent the last decade creating perimeters to protect the organization? Where do we start? The answer will depend on where we are in the Zero Trust maturity Model against the CISO’s Cybersecurity Roadmap. A careful review of what you have in place against this model is a good starting point.

    Implementing Zero Trust involves a careful inventory of your organization’s identities, devices, environment, applications, and data. Zero Trust is not simply about implementing technological solutions to protect the organization. A clear understanding of the business and its transformation strategies is likewise important. This is especially true for hybrid organizations that will continually transition toward a cloud or service-enabled environment.

    The Cybersecurity and Infrastructure Security Agency, Cyber Division in its Pre-decisional Draft of the Zero Trust Maturity Model, Version 1.0, June 2021, presented a high-level view of the Zero Trust Maturity Model across each maturity stage.

    An organization’s security controls can be mapped into this recommended model regardless of its architecture. We must understand where our organization truly stands in each of the pillars as prescribed. The maturity levels are summarized as follows.

    Traditional - manually configured systems and policies, siloed point solutions that require a manual incident response, mitigation, and deployment.

    Advanced - semi-automated, cross-pillar coordination, centralized identities, controls, visibility, and automation with the capability to deploy predefined mitigations and controls.

    Implementing Zero Trust Involves A Careful Inventory Of Your Organization’s Identities, Devices, Environment, Applications, And Data

    Optimal - fully automated with dynamic least-privilege access, interoperable across pillars with centralized and orchestrated visibility.

    As the business continues to transform, the CISO must understand the who and what identities access what data and where.

    Is multi-factor authentication a standard across the workforce to include its 3rd party providers? Does the CISO have a clear inventory of the organization’s data across all environments? Is there a clear inventory of all systems and workloads across the enterprise? As we journey through this model, we may realize that the security program can be at different levels in each of these pillars. Understanding where we are in this maturity model allows us to build the requisite controls to support and protect the organization and its business objectives.

    tag

    inventory

    cyber attack

    review

    Weekly Brief

    loading
    Top 10 Workflow Solutions Providers in APAC - 2025
    ON THE DECK
    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://workflow.apacciooutlook.com/cxoinsights/where-am-i-with-zero-trust-the-cisos-reality-nwid-10223.html