Intelligent CIO APAC Issue 24 | Page 44

CIO OPINION
Zero Trust leverages the Internet as a communications backbone .
Steve Singer , Regional Vice President and ANZ Country Manager , Zscaler

If achieving effective security is the question . . . Zero Trust is the answer

Steve Singer , Regional Vice President and ANZ Country Manager , Zscaler , tells us how IT leaders can achieve effective security with Zero Trust .

The past two decades have seen astounding progress made in all areas of Information Technology . From the rise of the smartphone and cloud computing to exponential increases in processor and storage capacities , IT ’ s role as a critical business enabler has never been more evident .

However , during the same period , the power of cybercriminals has also increased . As a result , cyberattacks have skyrocketed , resulting in significant disruptions and losses .
Zscaler ’ s 2022 ThreatLabz Phishing Report showed a dramatic 29 % growth in overall phishing attacks compared to previous years , with retail and wholesale companies bearing the brunt of it . At the same time , the report also showed an emerging reliance on Phishingas-a-Service methods , as well as new attack vectors , such as SMS phishing , becoming one of the more prevalent methods of intrusion .
In response to this deteriorating situation , growing numbers of organizations are adopting a security strategy known as Zero Trust whereby all traffic is deemed Zero Trust traffic , identity and context always come before connectivity and applications , including app environments , should remain invisible to authorized users .
This strategy comprises a set of security principles based on the idea that reducing granted trust for access will lead to greater assurance of authorized identity .
44 INTELLIGENTCIO APAC www . intelligentcio . com