Using 'Zero Trust’ to Secure Identities and EndpointsMicrosoft's Terence Gomes on How to Begin the 'Zero Trust' Journey
Trust but verify, privilege access and continuous monitoring with an "assume breach" mindset are the principles an enterprise must follow to begin its "zero trust" journey, says Terence Gomes, country head of Microsoft Security India.
"You can start your zero trust journey with your existing environment. We encourage customers to follow a two-step approach: Step one is focused on implementing strong authentication controls beyond passwords, which can be done with existing infrastructure. The second step is limiting privilege access," he says.
In a video interview with Information Security Media Group, Gomes also discusses:
- Why an identity-centric zero trust approach is easy;
- How to leverage existing IAM solutions;
- Microsoft's own zero trust journey.
Gomes is country head at Microsoft Security India. He has been part of the Indian IT industry for more than 23 years, with most of his time dedicated to advising organizations and partners on dealing with cyberthreats and cyber fraud. He speaks at various forums - including Indian Payment Risk Council, IDRBT, ISAACA Mumbai Chapter - and other industry events to share best practices for cybersecurity and cyber fraud prevention.