Governance & Risk Management , SASE , Zero Trust

Securing Your Network Through Zero Trust

Netskope's David Fairman on Managing Access Control in a 'Zero Trust' Environment
David Fairman, CSO, APAC, Netskope

To successfully adopt the "zero trust" model, it is not enough to have a good access control, says David Fairman, CSO, APAC at Netskope.

See Also: Make Zero Trust Happen

"Zero trust is the principle of ensuring we are performing continuous evaluation of access to that resource though the entirety of that session," says Fairman. "It is not only about login time and access time but it is about the entirety of that session and having adaptive access control policies based on those signals," he says.

In a video interview with Information Security Media Group previewing an upcoming executive roundtable discussion, Fairman also discusses:

  • Existing technologies to leverage to ensure zero trust adoption;
  • How to achieve network security through zero trust;
  • Technologies to leverage for the "work from anywhere" model.

Fairman is CSO, APAC at Netskope. He has extensive experience in the global financial services sector. Fairman is also a partner at SixThirty, a venture fund that invests in early-stage enterprise technology companies from around the world.

About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.