Governance & Risk Management , Zero Trust

Fitting Zero Trust to Your Organization's Needs

EY's Hira on the Practical Aspects of Adopting a Zero Trust Framework
Jay Hira, director of cyber transformation, EY

While zero trust as a strategy is meant for every organization, attaining 100% zero trust is not, says Jay Hira, director of cyber transformation at EY in Sydney.

See Also: Conquer Any Security Challenge With Next-Gen Solutions

"As a strategy, every organization should work toward achieving zero trust. However, organizations have to tune the adoption keeping in mind business objective, risk profile and reducing the risk profile while aligning better with the business," he says.

"It is more about measuring capabilities that are being delivered by this program - whether it is in line with the principles of zero trust."

In a video interview with Information Security Media Group, Hira also discusses:

  • Why achieving a 100% zero trust framework is not for every organization;
  • What zero trust challenges concern CISOs the most;
  • Whether the zero trust framework is a good fit for every organization.

Hira is a cybersecurity strategy and transformation director with more than 15 years of international experience supporting financial services organizations to become more cyber resilient through zero trust adoption to build trust and attract more customers, enabling growth.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.