Governance & Risk Management , Zero Trust

Applying Zero Trust Architecture in Energy, Military Sectors

Two Security Experts Discuss What Zero Trust Means to Their Organizations
(from left) Mel Migriño and Francel Margareth Taborlupa

How tough is it to apply the principals of zero trust architecture in an OT environment and a military environment? Two experts - Mel Migriño, the vice president and group CISO at Meralco, the largest energy company in Philippines, and Francel Margareth Taborlupa, information systems officer at the National Task Force - discuss the challenges and opportunities of implementing ZTA.

See Also: Live Webinar | A Buyers' Guide: What to Consider When Assessing a CASB

"It is first important to know and understand the asset within your ICS, IoT or IIoT environment. Moreover, it is important to understand the various points of integration. In order to do micro segmentation, it is important to segment the OT into five pillars," says Migriño.

"We have now recognized that existing security approaches are not enough. Therefore, in our sector, enterprise leaders are finding that the zero trust model could deliver best results. Not all technology components are available today, so we have begun by encryption of data in store and in transit," says Taborlupa.

In a video panel interview with Information Security Media Group, Migriño and Taborlupa also discuss:

  • How zero trust can be applied to legacy systems;
  • Where the National Task Force in the Philippines is on its zero trust journey;
  • Top tips for zero trust implementation.

Taborlupa is information systems officer at the National Task Force. She is also head executive assistant to the presidential adviser on peace and reconciliation. She has been named one of the Top 30 Women in Security in ASEAN 2021 and one of the Top 10 Women in Cybersecurity Philippines 2020.

Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy, IT audit and project management across multiple industries.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.