Applying Zero Trust Architecture in Energy, Military SectorsTwo Security Experts Discuss What Zero Trust Means to Their Organizations
How tough is it to apply the principals of zero trust architecture in an OT environment and a military environment? Two experts - Mel Migriño, the vice president and group CISO at Meralco, the largest energy company in Philippines, and Francel Margareth Taborlupa, information systems officer at the National Task Force - discuss the challenges and opportunities of implementing ZTA.
"It is first important to know and understand the asset within your ICS, IoT or IIoT environment. Moreover, it is important to understand the various points of integration. In order to do micro segmentation, it is important to segment the OT into five pillars," says Migriño.
"We have now recognized that existing security approaches are not enough. Therefore, in our sector, enterprise leaders are finding that the zero trust model could deliver best results. Not all technology components are available today, so we have begun by encryption of data in store and in transit," says Taborlupa.
In a video panel interview with Information Security Media Group, Migriño and Taborlupa also discuss:
- How zero trust can be applied to legacy systems;
- Where the National Task Force in the Philippines is on its zero trust journey;
- Top tips for zero trust implementation.
Taborlupa is information systems officer at the National Task Force. She is also head executive assistant to the presidential adviser on peace and reconciliation. She has been named one of the Top 30 Women in Security in ASEAN 2021 and one of the Top 10 Women in Cybersecurity Philippines 2020.
Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy, IT audit and project management across multiple industries.