APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Workflow
    • Cyber Security
    • Hotel Management
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Workflow
    Editor's Pick (1 - 4 of 8)
    left
    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê

    Enhancing Workflow Management In Media

    Andre Mendes, CIO, Department of Commerce - International Trade Administration

    Delivering efficiency through workflow automation

    Wayne Marchant, CIO, Heritage Bank

    The Evolving Role of IT for Value Added Solutions

    Aaron Weis, VP & CIO, Axalta Coating Systems

    Cognitive automation: Revolution at the speed of thought

    Ritesh Sarda, CIO, Sun Life Financial, Hong Kong

    Addressing the Challenges in Behavioral Health Practice with Technology

    Wes Williams, VP & CIO, Mental Health Center Of Denver

    Workflow Management to Be a Game Changer in Businesses

    Jim Simpson, SVP & CIO, Avmed

    Simplifying Document-Intensive Tasks with Workflow Management

    Anthony G. Dupree, CISM CIO/CISO, Novitex Enterprise Solutions

    right

    Where Am I With Zero Trust? The Ciso's Reality

    Charmaine Valmonte, Chief Information Security Officer, Aboitiz.

    Tweet
    content-image

    Charmaine Valmonte, Chief Information Security Officer, Aboitiz.

    By failing to prepare, you are preparing to fail.” ― Benjamin Franklin. Cybersecurity has been a top priority for most organizations for the past decade. A large portion of an organization’s operational budget is spent on state-ofthe-art technologies as a means to protect the business from the threats of a cyber attack. However, technology is not the definitive solution to eliminate or reduce the risk; a disruption causing major losses can happen if the process and people are excluded from the equation.

    The transformed cybersecurity professional expects a cyber attack to happen anytime and come from anywhere. Today’s CISO must accept that the organization will continue to transform. The perimeters we’ve since built for the organization cannot contain or protect today’s evolving environment.

    Zero Trust, defined by the National Institute of Standards and Technology in its Special Publication 800-207, states that “Zero Trust presents a shift from a location-centric model to a data-centric approach for fine-grained security controls between users, systems, data and assets that change over time”. What does this mean to a CISO who has spent the last decade creating perimeters to protect the organization? Where do we start? The answer will depend on where we are in the Zero Trust maturity Model against the CISO’s Cybersecurity Roadmap. A careful review of what you have in place against this model is a good starting point.

    Implementing Zero Trust involves a careful inventory of your organization’s identities, devices, environment, applications, and data. Zero Trust is not simply about implementing technological solutions to protect the organization. A clear understanding of the business and its transformation strategies is likewise important. This is especially true for hybrid organizations that will continually transition toward a cloud or service-enabled environment.

    The Cybersecurity and Infrastructure Security Agency, Cyber Division in its Pre-decisional Draft of the Zero Trust Maturity Model, Version 1.0, June 2021, presented a high-level view of the Zero Trust Maturity Model across each maturity stage.

    An organization’s security controls can be mapped into this recommended model regardless of its architecture. We must understand where our organization truly stands in each of the pillars as prescribed. The maturity levels are summarized as follows.

    Traditional - manually configured systems and policies, siloed point solutions that require a manual incident response, mitigation, and deployment.

    Advanced - semi-automated, cross-pillar coordination, centralized identities, controls, visibility, and automation with the capability to deploy predefined mitigations and controls.

    Implementing Zero Trust Involves A Careful Inventory Of Your Organization’s Identities, Devices, Environment, Applications, And Data

    Optimal - fully automated with dynamic least-privilege access, interoperable across pillars with centralized and orchestrated visibility.

    As the business continues to transform, the CISO must understand the who and what identities access what data and where.

    Is multi-factor authentication a standard across the workforce to include its 3rd party providers? Does the CISO have a clear inventory of the organization’s data across all environments? Is there a clear inventory of all systems and workloads across the enterprise? As we journey through this model, we may realize that the security program can be at different levels in each of these pillars. Understanding where we are in this maturity model allows us to build the requisite controls to support and protect the organization and its business objectives.

    tag

    inventory

    cyber attack

    review

    Weekly Brief

    loading
    Top 10 Workflow Solutions Providers in APAC - 2025
    ON THE DECK
    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Building Agile, Secure and Human-Centered IT at Globe

    Building Agile, Secure and Human-Centered IT at Globe

    Raul Macatangay, Chief Information Officer, Globe Telecom
    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://workflow.apacciooutlook.com/cxoinsights/where-am-i-with-zero-trust-the-cisos-reality-nwid-10223.html