Access Management , Endpoint Security , Governance & Risk Management
Using 'Zero Trust' to Secure Your Identities
CyberArk's Ivan Lai on Taking a Risk-Based Approach to AuthenticationOrganizations should take a "zero trust" approach to secure their identities, as being able to authenticate and authorize every resource access will minimize risk, says Singapore-based Ivan Lai, solution strategy architect - access for Asia-Pacific and Japan at CyberArk.
See Also: OnDemand Panel Discussion | Practical Viewpoints: Global IT Security Compliance in 2022
The "zero trust" approach uses multifactor authentication, enforces privilege policies and enables continuous assessment and monitoring across the environment, says Lai in an Information Security Media Group interview.
In this video interview, as a preview to the upcoming virtual roundtable, Lai also discusses:
- Taking a risk-based authentication approach to securing identities;
- Leveraging the identity-as-a-service model;
- Enabling a single sign-on strategy that takes away the need for a password.
Lai focuses on solutions that empower organizations toward comprehensive identity security, providing insight into adequate controls on presenting privilege and credentials abuse and their measurement and moving organizations from manual and reactive states of security to an automated and proactive posture. Internally, he works with sales and marketing leadership to drive the business across identified segments. Lai has over 20 years of experience in selling and designing end-to-end security solutions and covering network, system and application layers for top corporations across the defense, financial, transportation and public sectors. Before joining CyberArk, he worked with software security vendors, including SailPoint, RSA, and IBM Security, in a variety of roles that included leading a pre-sales team to design a national-level authentication framework.