Governance & Risk Management , Video , Zero Trust

Assessing Threat Exposure: First Step to Zero Trust

Zscaler's Sudip Banerjee on Adopting a Pragmatic Approach to Zero Trust
Sudip Banerjee, field CTO, APJ region, Zscaler

Enterprises often embark on their zero trust journey by implementing its various components. While a phased approach to zero trust adoption is practical, the lack of a holistic vision may cause organizations to veer off the track.

See Also: Why the Future of Security Is Identity

Sudip Banerjee, field CTO for the APJ region at Zscaler, advised CISOs and CIOs to consider their current ecosystem, user and application interactions, integration with the wider ecosystem, and threat exposure as a starting point.

"Create a roadmap that addresses current pain points while laying the groundwork for future control layers, which can help CISOs optimize their zero trust efforts and achieve better return on investment,” he said.

In this video interview conducted at Information Security Media Group's Bengaluru Cybersecurity Summit, Banerjee discusses:

  • A unified vs. piecemeal approach to zero trust adoption;
  • Rip and replace vs. retrofitting zero trust into legacy systems;
  • Practical recommendations for adopting zero trust in phases.

At Zscaler, Banerjee is responsible for helping enterprises in the APJ region transform their legacy network and security solutions, adopt zero trust strategies, improve user productivity, and streamline IT operations and costs. He has nearly 30 years of experience, with expertise in the financial services and insurance domains. He has worked with leading financial services organizations, including GE Money, Reliance General Insurance and Reliance Capital.


About the Author

Shipra Malhotra

Shipra Malhotra

Managing Editor, ISMG

Malhotra has more than two decades of experience in technology journalism and public relations. She writes about enterprise technology and security-related issues and has worked at Biztech2.com, Dataquest and The Indian Express.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.