Zero trust, Security Strategy, Plan, Budget, Risk Assessments/Management, Network Security, Security Architecture

Telemetry crucial in zero-trust cybersecurity

Share

Experts at the Zero Trust Summit called on organizations seeking to implement a zero-trust cybersecurity model to monitor their networks with telemetry systems, FedScoop reports. Leveraging telemetry to automate responses could enable organizations to better track their networks and immediately detect suspicious activity, according to U.S. Army Command and Control Support Deputy Commander Colten O'Malley. However, organizations should have capable teams in charge of telemetry reading to facilitate quick responses, O'Malley said. Meanwhile, Appgate Chief Information Security Officer and Federal Division President Leo Taddeo emphasized that zero-trust solutions require data that can be used for policy enforcement. "We can adjust trust. Based on that telemetry, we can decide not only who to trust but when to trust and how to dynamically determine trust. So that’s an important part of continuous collection of telemetry. It’s not a one-and-done solution. If we can monitor, continuously collect telemetry on a regular basis, and we can adjust trust... that’s how you mature to a zero-trust solution," Taddeo said.

Telemetry crucial in zero-trust cybersecurity

Experts at the Zero Trust Summit called on organizations seeking to implement a zero-trust cybersecurity model to monitor their networks with telemetry systems, FedScoop reports.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.