Cloud Security , Events , Governance & Risk Management

How Zero Trust Is Redefining Enterprise Security

UBS's Former Director Frankie Shuai on Implementation Success and Challenges
Frankie Shuai, former head, cyber and technology risk, Singapore and ANZ, UBS

The shift to remote work and digital banking has fundamentally changed how organizations approach security, moving away from traditional perimeter-based models toward continuous verification systems. This transformation has made zero trust architecture crucial for protecting enterprise assets.

See Also: 2024 Threat Hunting Report: Insights to Outsmart Modern Adversaries

The model's transformation from concept to practical implementation has been particularly evident in financial services, where data protection and access control have become critical considerations in multi-cloud environments, according to Frankie Shuai, former head of cyber and technology risk for Singapore and ANZ at UBS.

"When your data is in sitting your own data center, you can focus on your boundaries, make sure you have a solid parameter so that data sitting on data center may not be needed to be encrypted," he said. "But when the data moves outside to the public cloud, or more than one public cloud service provider, you have to make sure the data is protected … if anything goes wrong, the regulator will come to you, not a service provider."

"The mindset has changed because you cannot simply trust everything - you need to verify first. And this verification is not just one time. It's continuous," Shuai said.

In this video interview with Information Security Media Group at the GovWare 2024 Summit, Shuai also discussed:

  • The five pillars of zero trust and their role in modern security architecture;
  • How microsegmentation strengthens network security in cloud environments;
  • The importance of proper data classification and encryption in public cloud deployment.

With nearly 20 years of experience in cybersecurity and technology risk management, Shuai currently oversees regional information security efforts, focusing on integrating cybersecurity strategies with business objectives.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.