Cybersecurity Leaders Cite Zero Trust Among Most Effective Security Practices

Survey Reveals Organizations’ Need for Gap Identification, Process Improvements and Roadmap for Progress

 

DENVER — Feb. 8, 2022 — Optiv, the cyber advisory and solutions leader, has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing Zero Trust as an effective way to reduce cyber risk.

 

The survey, which was conducted from June through October of 2021, was in collaboration with Palo Alto Networks and Information Security Media Group (ISMG). Respondents cited Zero Trust as one of the most effective security practices, and 100% acknowledged it as important in reducing their organization’s cyber risk.

 

Download the full survey report: Zero Trust Strategies for 2022

 

Zero Trust is an information security model based on the principle of maintaining strict access controls by not trusting anyone or any action by default, even those already inside the network perimeter. Each transaction is evaluated for need and risk. In other words, assume breach and trust nothing by taking the default position that any entity — user or device — is a potential threat. In a networked world full of threat actors, never trust, always verify.

 

Image
ISMG-press-release-image_high-res

 

“The need for and importance of implementing a Zero Trust strategy remains top of mind for cybersecurity leaders,” says Jerry Chapman, engineering fellow at Optiv and co-author of the book “Zero Trust Security: An Enterprise Guide.” “Optiv’s adaptive, holistic approach provides clients with integrated real-time solutions that provide the type of cyber resiliency needed to identify, manage and respond to today’s internal and external threats.”

 

While survey respondents agreed on the need for a Zero Trust architecture, they noted several cultural and environmental factors impeding a Zero Trust evolution within their organization. The top three include:

 

  • Too many internal silos/stakeholders for different components of Zero Trust (47%)
  • Too many legacy technologies that do not “support” Zero Trust (44%)
  • Lack of internal expertise to develop Zero Trust roadmap and policies (39%)

 

As more organizations have, or plan to, leverage the expertise of external consulting partners to aid in their Zero Trust journey, Optiv is helping clients adopt a Zero Trust approach through a host of gap analysis, best practice deployment and roadmap development services. They are designed to guide cybersecurity leaders and organizations through their Zero Trust strategy by meeting clients where they are and building prioritized roadmaps and action plans based on their needs.

 

Optiv’s Zero Trust services helps organizations:

 

  • Protect/prevent ransomware and insider threats
  • Secure an expanding, complex network, as well as hybrid users and proliferating devices
  • Reduce security vulnerabilities
  • Minimize attack surface penetration

 

The 150 survey responses came from various sectors, including financial, health care, high tech and government. Forty-three percent of respondents were at the CISO/CSO level at organizations with 1,000-5,000 employees.

 

Visit Optiv’s website to learn more about our overarching approach, including:

 

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?