Governance & Risk Management , Zero Trust

Using 'Zero Trust’ to Secure Identities and Endpoints

Microsoft's Terence Gomes on How to Begin the 'Zero Trust' Journey
Terence Gomes, country head of Microsoft Security India

Trust but verify, privilege access and continuous monitoring with an "assume breach" mindset are the principles an enterprise must follow to begin its "zero trust" journey, says Terence Gomes, country head of Microsoft Security India.

See Also: Conquer Any Security Challenge With Next-Gen Solutions

"You can start your zero trust journey with your existing environment. We encourage customers to follow a two-step approach: Step one is focused on implementing strong authentication controls beyond passwords, which can be done with existing infrastructure. The second step is limiting privilege access," he says.

In a video interview with Information Security Media Group, Gomes also discusses:

  • Why an identity-centric zero trust approach is easy;
  • How to leverage existing IAM solutions;
  • Microsoft's own zero trust journey.

Gomes is country head at Microsoft Security India. He has been part of the Indian IT industry for more than 23 years, with most of his time dedicated to advising organizations and partners on dealing with cyberthreats and cyber fraud. He speaks at various forums - including Indian Payment Risk Council, IDRBT, ISAACA Mumbai Chapter - and other industry events to share best practices for cybersecurity and cyber fraud prevention.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.