Michael Wilcox has more than 20 years of experience providing IT Security Leadership across a comprehensive portfolio of security environments. He has developed programs and centers of excellence for IT Security services including forensics, incident response, education and awareness programs, vulnerability assessments, penetration testing, data loss prevention, enterprise information security architecture, compliance, encryption, identity & access management and disaster recovery. Michael has held CISO roles for a global Fortune 300 manufacturing company and the largest non-profit organization for cancer research.
ZT applications managers face significant challenges as they balance top-down executive mandates with the need to make progress on software issues.
CISOs expect application security to fully support ZT, while AppSec managers use the ZT framework to organize & prioritize investments and activities.
By identifying key priorities before a breach, ZT infrastructure managers can contribute meaningfully to the success of the organization’s ZT strategy.
Contemporary zero trust infrastructure often centers on outside-the-perimeter resources, challenging security leaders who are looking to establish resilient environments.
Zero trust networks provide visibility into key issues, including segmentation, secure access to data, applications, and identity and device resources.
The network plays a unique role in the shift from traditional perimeter-based security strategies to zero trust, spanning four key categories.
Identifying and employing relevant, meaningful metrics builds support for ZT across the organization and enables CISOs to avoid “precision without accuracy”
This article defines a 10-step path to zero trust (ZT), spanning foundational and transitional activities and “deploy, monitor, and evolve” action steps.
This article identifies six key factors that contribute to a CISO’s ability to work with corporate stakeholders to roll out zero trust (ZT).
Identifying the 33 technologies and IT management practices that define a successful zero trust roadmap.
Zero trust (ZT) supports business objectives for three personas: senior executives, the CIO, and the CISO. Aligning strategy with these personas builds ZT support.
Leaders invest in zero trust to move beyond reactive risk management, rationalize investments, improve scale and speed to market, and gain efficiencies.
Zero Trust (ZT) success starts with executive commitment to risk, privacy, and compliance management as a goal . How do CISOs obtain sponsorship for ZT?
Zero trust is about access management, and is a journey that has no rigidly-defined endpoint
How to start or improve your GRC program with Stratascale’s review of the top 41 vendors you need to know