Assessing Threat Exposure: First Step to Zero TrustZscaler's Sudip Banerjee on Adopting a Pragmatic Approach to Zero Trust
Enterprises often embark on their zero trust journey by implementing its various components. While a phased approach to zero trust adoption is practical, the lack of a holistic vision may cause organizations to veer off the track.
Sudip Banerjee, field CTO for the APJ region at Zscaler, advised CISOs and CIOs to consider their current ecosystem, user and application interactions, integration with the wider ecosystem, and threat exposure as a starting point.
"Create a roadmap that addresses current pain points while laying the groundwork for future control layers, which can help CISOs optimize their zero trust efforts and achieve better return on investment,” he said.
In this video interview conducted at Information Security Media Group's Bengaluru Cybersecurity Summit, Banerjee discusses:
- A unified vs. piecemeal approach to zero trust adoption;
- Rip and replace vs. retrofitting zero trust into legacy systems;
- Practical recommendations for adopting zero trust in phases.
At Zscaler, Banerjee is responsible for helping enterprises in the APJ region transform their legacy network and security solutions, adopt zero trust strategies, improve user productivity, and streamline IT operations and costs. He has nearly 30 years of experience, with expertise in the financial services and insurance domains. He has worked with leading financial services organizations, including GE Money, Reliance General Insurance and Reliance Capital.