AI-Powered SASE , Governance & Risk Management , Zero Trust
Securing Your Network Through Zero Trust
Netskope's David Fairman on Managing Access Control in a 'Zero Trust' EnvironmentTo successfully adopt the "zero trust" model, it is not enough to have a good access control, says David Fairman, CSO, APAC at Netskope.
See Also: Definitive Guide to Navigate Your Enterprise Browser Landscape
"Zero trust is the principle of ensuring we are performing continuous evaluation of access to that resource though the entirety of that session," says Fairman. "It is not only about login time and access time but it is about the entirety of that session and having adaptive access control policies based on those signals," he says.
In a video interview with Information Security Media Group previewing an upcoming executive roundtable discussion, Fairman also discusses:
- Existing technologies to leverage to ensure zero trust adoption;
- How to achieve network security through zero trust;
- Technologies to leverage for the "work from anywhere" model.
Fairman is CSO, APAC at Netskope. He has extensive experience in the global financial services sector. Fairman is also a partner at SixThirty, a venture fund that invests in early-stage enterprise technology companies from around the world.