Intelligent CISO Issue 24 | Page 22

infographic A new report which surveyed more than 400 cybersecurity decision makers has revealed that 47% of cybersecurity professionals lack confidence applying a Zero Trust model to their Secure Access architecture. 72% OF ORGANISATIONS PLAN TO IMPLEMENT ZERO TRUST CAPABILITIES THIS YEAR As 72% of organisations plan to implement Zero Trust capabilities in 2020 to mitigate growing cyber-risk, nearly half (47%) of cybersecurity professionals lack confidence applying a Zero Trust model to their Secure Access architecture, according to the 2020 Zero Trust Progress Report released by Cybersecurity Insiders and Pulse Secure, a leading provider of software-defined Secure Access solutions. The report surveyed more than 400 cybersecurity decision makers to share how enterprises are implementing Zero Trust security in their organisation and reveal key drivers, adoption, technologies, investments and benefits. The report found that Zero Trust access is moving beyond concept to implementation in 2020, but there is a striking confidence divide among cybersecurity professionals in applying Zero Trust principles. “Zero Trust holds the promise of vastly enhanced usability, data protection and governance. However, there is a healthy degree of confusion among cybersecurity professionals about where and how to implement Zero Trust controls in a hybrid IT environment – which is clearly reflected in respondents’ split confidence levels,” said Scott Gordon, Chief Marketing Officer at Pulse Secure. Of the organisations building out Zero Trust capabilities in 2020, data protection, trust earned through entity verification and continuous authentication and authorisation were cited as the most compelling tenets of Zero Trust. The report also discovered nearly one-third of organisations (30%) are seeking to simplify Secure Access delivery, including enhancing user experience and optimising administration and provisioning. Additionally, 53% of respondents plan to move Zero Trust access capabilities to a hybrid IT deployment. More than 40% of survey respondents expressed that vulnerable mobile and atrisk devices, insecure partner access, cyberattacks, over privileged 22 Issue 24 | www.intelligentciso.com