Governance & Risk Management , IT Risk Management , Privacy

Misconceptions About 'Zero Trust'

Forescout's Steven Hunter on How to Ensure Successful Deployment
Steven Hunter, senior director, system engineering, APJ, Forescout

A common misconception about the “zero trust” model is that once it’s deployed, network security is no longer required, says Steven Hunter of Forescout.

See Also: The Reality of Effectively Addressing Third-Party Security Risk

In a video interview at Information Security Media Group’s recent Cybersecurity Summit in Mumbai, Hunter addresses:

  • Common misconceptions about zero trust;
  • Challenges of coupling access with identity;
  • How to ensure successful implementation of zero trust.

Hunter is senior director, system engineering, APJ, at Forescout. Previously, he spent more than 16 years at Cisco in various roles in Australia and Singapore.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.