Endpoint Security , Governance & Risk Management , Internet of Things Security
Zero Trust and the Role of Internet IsolationMenlo Security's Jack Miller on How to Face Up to the Fundamental Zero Trust Challenge
It isn’t that we struggle to define the zero trust security model. It’s that we ignore the real challenge, says Jack Miller of Menlo Security. We need to shift our view of authentication and access from “innocent until proven guilty” to “guilty until proven innocent.”
In this video interview with Information Security Media Group, Miller discusses:
- The application of this new view to access.
- The role of Internet isolation in this model.
- The need for new education to ensure maximum adoption.
For over 20 years, Miller has been at the forefront of information security. After 16 years of building and running enterprise security programs and operations as a CISO for 4 multibillion-dollar organizations, he shifted his focus to the startup world, first working as an executive in residence for a leading VC and then running security, strategy, operations, and services for multiple U.S. and European security startups. Currently, he serves as head of global professional services for Menlo Security, where he leverages his experience with enterprise deployments to build people and processes to decrease time to value and ensure a successful onboarding experience for Menlo customers. Miller has written numerous articles and blogs on information security and regularly presents at industry conferences, sharing his insights to help mold the next generation of security leaders.