Intelligent CISO Issue 34 | Page 16

latest intelligence
PRESENTED BY

THE INEVITABLE ASCENT OF ZERO TRUST

ENSURE USER ACTIVITIES ARE TRUSTWORTHY WITHOUT INTERRUPTING WORKFLOW

UUnderstanding the Problem of Trust

There is a story about the creation of the game of chess that illustrates why cybersecurity solutions cannot rely on traditional trust models . The story goes that the inventor of chess presented the game to a king . The king was very impressed and offered the creator whatever he wished as a reward . The creator requested a single grain of rice for the first square of the chessboard . Also , each square after the first would receive double the rice of the previous square , until the end of the chessboard was reached .
DOWNLOAD WHITEPAPERS AT : WWW . INTELLIGENTCISO . COM / WHITEPAPERS
The request initially seemed quite manageable to the king , but as time progressed it became apparent that fulfilling it was impossible . The doubling rice was an exponentially expensive request , ultimately requiring quintillions ( 264 – 1 ) of grains .
The king could not honor the request , so he allegedly executed the inventor for insolence .
The chess board / rice problem is similar to the endpoint security dilemma facing many organizations today . In the early days of computing , securing an employee workstation was a manageable task .
When multiple workstations joined a network , or several connected networks ( and ultimately , the Internet ), securing the environment became considerably more difficult . Now , with the growth of interconnected Internet of things ( IoT ) devices , securing all technology touching workplace resources is nigh impossible . u
16 www . intelligentciso . com